General
-
Target
f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51
-
Size
2.5MB
-
Sample
240808-qghs1axena
-
MD5
353302ef3297119ad7e15d131b85c04d
-
SHA1
c9140fc33bd499732feebc03ea4d3588675ae10f
-
SHA256
f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51
-
SHA512
3a1204eabe37dceb617049f8b2b9a2820b284d6861842791afb942198deecb47364084d66ca1a61c55fa934c9c3bd7e60517ee0928824e6246e8b1a2688df2c2
-
SSDEEP
49152:T5i/25VXSPWNUaMgbiIctKyn4YGcvqiykXvyZeyXpdpffa:T5i/aNSEbVvm4YBvPKZeMd
Static task
static1
Behavioral task
behavioral1
Sample
f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
darkgate
Silhouette0
wuauserv.site
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
pJdkDQxC
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
Silhouette0
Targets
-
-
Target
f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51
-
Size
2.5MB
-
MD5
353302ef3297119ad7e15d131b85c04d
-
SHA1
c9140fc33bd499732feebc03ea4d3588675ae10f
-
SHA256
f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51
-
SHA512
3a1204eabe37dceb617049f8b2b9a2820b284d6861842791afb942198deecb47364084d66ca1a61c55fa934c9c3bd7e60517ee0928824e6246e8b1a2688df2c2
-
SSDEEP
49152:T5i/25VXSPWNUaMgbiIctKyn4YGcvqiykXvyZeyXpdpffa:T5i/aNSEbVvm4YBvPKZeMd
Score10/10-
Detect DarkGate stealer
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-