General
-
Target
6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea.exe
-
Size
4.1MB
-
Sample
250126-lbcmksxqbx
-
MD5
998cd2e474751b5de344562b4ddb39e2
-
SHA1
70ee02a76510b0757e3b26ffd98834f0d259f9d4
-
SHA256
6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea
-
SHA512
e69e703c79e9c151245cef8caaa18b30fc2992c72e98b2e197239eb439837ee3c5d446e99f117f4aec0dc56527fd943949e62bbaadd43e123d83d53ad09f43e7
-
SSDEEP
49152:gR/KpmZubPf2S8W2ILeWl+C1pNjWy5Snd0eigXNG/2KyT0aXgkKdOcUP6CVjyusJ:G/jtYLP16y5E04Za1UP6mod
Static task
static1
Behavioral task
behavioral1
Sample
6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkgate
user1
155.138.149.77
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
sDcGdADE
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
user1
Targets
-
-
Target
6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea.exe
-
Size
4.1MB
-
MD5
998cd2e474751b5de344562b4ddb39e2
-
SHA1
70ee02a76510b0757e3b26ffd98834f0d259f9d4
-
SHA256
6b6676267c70fbeb3257f0bb9bce1587f0bdec621238eb32dd9f84b2bcd7e3ea
-
SHA512
e69e703c79e9c151245cef8caaa18b30fc2992c72e98b2e197239eb439837ee3c5d446e99f117f4aec0dc56527fd943949e62bbaadd43e123d83d53ad09f43e7
-
SSDEEP
49152:gR/KpmZubPf2S8W2ILeWl+C1pNjWy5Snd0eigXNG/2KyT0aXgkKdOcUP6CVjyusJ:G/jtYLP16y5E04Za1UP6mod
-
Darkgate family
-
Detect DarkGate stealer
-
Executes dropped EXE
-
Loads dropped DLL
-