General
-
Target
cc8ee15ab960c8421f9b556883a5006d713d5cde92fce31c027df5caf15b04bf
-
Size
2.4MB
-
Sample
241204-wc5pvstkhy
-
MD5
08b84d93da7f0a79a714aab3ba651043
-
SHA1
7cb73f3c67452af9e6ad8475e6df01f19776ac35
-
SHA256
cc8ee15ab960c8421f9b556883a5006d713d5cde92fce31c027df5caf15b04bf
-
SHA512
2364786da228dac5dae29faeffee75547447049e227cfc96acb162603c7ed3a885324508603f916ed7e8a6d62695c4b6c23837afa4d404e2f93df873d794d846
-
SSDEEP
49152:FTkw3cuEwOveoCFltsl4gd257wr8XyIaRCjQuBAk/Z7hjVHgoOJVFFfN:yw3EwOjCFlte4g8xwrObtU9k/Z7hpgFl
Static task
static1
Behavioral task
behavioral1
Sample
cc8ee15ab960c8421f9b556883a5006d713d5cde92fce31c027df5caf15b04bf.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkgate
drk3
todayput.shop
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
wJwfUFVH
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
drk3
Targets
-
-
Target
cc8ee15ab960c8421f9b556883a5006d713d5cde92fce31c027df5caf15b04bf
-
Size
2.4MB
-
MD5
08b84d93da7f0a79a714aab3ba651043
-
SHA1
7cb73f3c67452af9e6ad8475e6df01f19776ac35
-
SHA256
cc8ee15ab960c8421f9b556883a5006d713d5cde92fce31c027df5caf15b04bf
-
SHA512
2364786da228dac5dae29faeffee75547447049e227cfc96acb162603c7ed3a885324508603f916ed7e8a6d62695c4b6c23837afa4d404e2f93df873d794d846
-
SSDEEP
49152:FTkw3cuEwOveoCFltsl4gd257wr8XyIaRCjQuBAk/Z7hjVHgoOJVFFfN:yw3EwOjCFlte4g8xwrObtU9k/Z7hpgFl
-
Darkgate family
-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-