General
-
Target
filter0912.2.vbs
-
Size
250B
-
Sample
241210-mk32katkcw
-
MD5
0f5e506c6622ef23867764b600e2c4b4
-
SHA1
e6b079ecc9537672cc3b8390b0509770045b9bbd
-
SHA256
793b4e318eba9ef99173836a92ef2959a9ff73026647c0714ab7280f0dbe3fac
-
SHA512
48fca5308d3a37a7ab974c299c689ce8122b355eb44fe8bc033c80481f73fe74c13586b122d8e86fcd4d26d24153e5a034a8e7262801e3716a2010cbbc8f0b85
Static task
static1
Behavioral task
behavioral1
Sample
filter0912.2.vbs
Resource
win7-20240729-en
Malware Config
Extracted
darkgate
drk3
todayput.shop
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
sEhfQzVh
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
drk3
Targets
-
-
Target
filter0912.2.vbs
-
Size
250B
-
MD5
0f5e506c6622ef23867764b600e2c4b4
-
SHA1
e6b079ecc9537672cc3b8390b0509770045b9bbd
-
SHA256
793b4e318eba9ef99173836a92ef2959a9ff73026647c0714ab7280f0dbe3fac
-
SHA512
48fca5308d3a37a7ab974c299c689ce8122b355eb44fe8bc033c80481f73fe74c13586b122d8e86fcd4d26d24153e5a034a8e7262801e3716a2010cbbc8f0b85
-
Darkgate family
-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2AutoHotKey & AutoIT
1PowerShell
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1