General
-
Target
08ec22dd1d931a9d4194d5e46bc42914e62227c11e9fedce2175fe6a53eb4f92
-
Size
3.4MB
-
Sample
240818-nzj3nsselc
-
MD5
6446245c985087b919aa69304d1a8cac
-
SHA1
1b29352ea318550390e4bc072c6fe9704ceaeef6
-
SHA256
08ec22dd1d931a9d4194d5e46bc42914e62227c11e9fedce2175fe6a53eb4f92
-
SHA512
818531a09029e9da85295e0e5cd358da4443e15fcd09bbd931edfba00e14f1f93fdae29b5db1fe44ec4a9a4846a91557ba4f5476ac6c2ddbced987e22b9d5bff
-
SSDEEP
49152:XwREDDMfG6Qgvc/5WUbGsQ4Xw4z0g3QeT84fB84AdcdHeMxWrP+beY7UY714:XwREaQX/9cqDzJQeT8458zudMwZgN
Static task
static1
Behavioral task
behavioral1
Sample
08ec22dd1d931a9d4194d5e46bc42914e62227c11e9fedce2175fe6a53eb4f92.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
darkgate
test3
127.0.0.1
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
sXhElIrM
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
test3
Targets
-
-
Target
08ec22dd1d931a9d4194d5e46bc42914e62227c11e9fedce2175fe6a53eb4f92
-
Size
3.4MB
-
MD5
6446245c985087b919aa69304d1a8cac
-
SHA1
1b29352ea318550390e4bc072c6fe9704ceaeef6
-
SHA256
08ec22dd1d931a9d4194d5e46bc42914e62227c11e9fedce2175fe6a53eb4f92
-
SHA512
818531a09029e9da85295e0e5cd358da4443e15fcd09bbd931edfba00e14f1f93fdae29b5db1fe44ec4a9a4846a91557ba4f5476ac6c2ddbced987e22b9d5bff
-
SSDEEP
49152:XwREDDMfG6Qgvc/5WUbGsQ4Xw4z0g3QeT84fB84AdcdHeMxWrP+beY7UY714:XwREaQX/9cqDzJQeT8458zudMwZgN
-
Detect DarkGate stealer
-
Executes dropped EXE
-
Adds Run key to start application
-