General
-
Target
933fbda1ca7c4a52adbb48d038c8ba5ed5ee411d1096b2222ca383ca6d96a6bc.zip
-
Size
2.0MB
-
Sample
240825-lwb7jsxgmh
-
MD5
ab3c640841540414d0583e744693da75
-
SHA1
8156b216fd7059dbd1046b943ade1b0a6a64de1b
-
SHA256
933fbda1ca7c4a52adbb48d038c8ba5ed5ee411d1096b2222ca383ca6d96a6bc
-
SHA512
7b52ac1858e1ddf3a8908169b935c428ad3a37ee12f0b61130d9eb1c08841b84b8c3820804a31f00de152030b4242b5020ca17ddcdd48c47b14a4d05f525e8f8
-
SSDEEP
49152:yTZOriGAFEogB1WLgelipZlroMB6n1FI1VVkeXeKZZD:eOri6JULdiFExXuDXl9
Malware Config
Extracted
darkgate
http://sanibroadbandcommunicton.duckdns.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
5864
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
true
-
crypto_key
LAbQdWWsbybjAY
-
internal_mutex
bbcAde
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
10
-
rootkit
false
-
startup_persistence
false
Extracted
darkgate
uPtZ
http://sanibroadbandcommunicton.duckdns.org
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
5864
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
true
-
crypter_raw_stub
false
-
crypto_key
qwNPPzrRTNHogf
-
internal_mutex
hykYbY
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
1
-
rootkit
false
-
startup_persistence
true
Targets
-
-
Target
pidgin.exe
-
Size
108KB
-
MD5
c283b2379ea584aab52abee0844b02a0
-
SHA1
903f9c7dcadf578637d604be681588fffec90e9b
-
SHA256
8292226e43a1aced9d38e2bdfb14cebabc12f9aa0a76ebdc47971eac026407f2
-
SHA512
a7e285d0d7ed7f212d33da6957ed9b2ba70ecd0e69852b52f33ebedc4682a1dc9621f6304b4c06b91b9ea74d94f1b6c3fad1d1f6f67f18512245870f908cd157
-
SSDEEP
1536:dV7q+SakHLKZ9tCAxtXSB5TDW/3CEdbjYVl4NGGwWArUiqvBwy/kTkiw3ciwjm:dpHKeJCCtX8TDafkVl4sG10MLoPm
-
Detect DarkGate stealer
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-