General
-
Target
dr_drop_L_Cryp_Mem.exe
-
Size
6.7MB
-
Sample
241118-ejmzysxnds
-
MD5
d9ec1112453f05e7aedc4219abb7d032
-
SHA1
f5444e58f9c9d6381443c1157f9fe0c1bfb36cbe
-
SHA256
878dac750a0717184095b18885aab76da813c897482ea10154393988d122855b
-
SHA512
98921f0a2ca4fb381552c2ac25ca291219419875782464b5a93a8c943b484a11a0d6f5007460a5f0977e0449688c135e66e75baf970fda1b0d6dac0167a3e86d
-
SSDEEP
196608:OkJzG+AC+tJsqYcqE4kSyJAiz3wDRt1BHEg:ieRzRXdE
Static task
static1
Malware Config
Extracted
darkgate
Derry
164.132.5.124
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
1111
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
wfQGmVbK
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
Derry
Targets
-
-
Target
dr_drop_L_Cryp_Mem.exe
-
Size
6.7MB
-
MD5
d9ec1112453f05e7aedc4219abb7d032
-
SHA1
f5444e58f9c9d6381443c1157f9fe0c1bfb36cbe
-
SHA256
878dac750a0717184095b18885aab76da813c897482ea10154393988d122855b
-
SHA512
98921f0a2ca4fb381552c2ac25ca291219419875782464b5a93a8c943b484a11a0d6f5007460a5f0977e0449688c135e66e75baf970fda1b0d6dac0167a3e86d
-
SSDEEP
196608:OkJzG+AC+tJsqYcqE4kSyJAiz3wDRt1BHEg:ieRzRXdE
-
Darkgate family
-
Detect DarkGate stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-