General
-
Target
test.zip
-
Size
1.8MB
-
Sample
250327-2elbws1nx4
-
MD5
4db115907e650e6f46d72d071e7128a6
-
SHA1
028cef19d1afc134abf870da9dfe75751e9ea246
-
SHA256
5fb1567d2cbbaf1df7c4ec782f8c9b1a0e1a171bdb6f814f3b3089dab7a03bf4
-
SHA512
4c98da8cf8ef294eff6c0f8d80f47a5a150f172152130d01550ed8edefb8d1474b69b04051997332040be0633f71c4166b08f621314a2a18fdbd0b8e04244f2b
-
SSDEEP
49152:f6GRvDtdqwdSo7vBmEOqMEfsr4+SItf0cZ8waS3Lo:f6GRx8DyBmxr9SIac/7o
Static task
static1
Behavioral task
behavioral1
Sample
test/Autoit3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test/Autoit3.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
test/SafeService.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
test/SafeService.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
test/script.a3x
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
test/script.a3x
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkgate
drk3
aspava-yachting.com
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
ZuMRODIC
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
drk3
Targets
-
-
Target
test/Autoit3.exe
-
Size
872KB
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
-
SHA1
2a4062e10a5de813f5688221dbeb3f3ff33eb417
-
SHA256
237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
-
SHA512
195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
SSDEEP
12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
-
Darkgate family
-
Detect DarkGate stealer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
-
-
Target
test/SafeService.dll
-
Size
3.1MB
-
MD5
32fe1ed2b1895b0585423b2627e59c2a
-
SHA1
384c0d8208d4321ce6071b796aea3c82a7a49b03
-
SHA256
0234d641731bca825dc4d3f45aeff65776af81260d9a1efdbf54f710ff014a85
-
SHA512
d6e7866e60931cc9c174ddbb72677b1d053145dc98c627aa8510b137c527dc58e8c04d85702f7d25cee8ab6d50592d9e2ebf6df61506bc5e05bd07fc027717cb
-
SSDEEP
49152:dZhL9XR3wxZXRTZUcuVHleFPH1FBJtFfmHrPdvsr:3agbONFom
Score1/10 -
-
-
Target
test/script.a3x
-
Size
585KB
-
MD5
19c3cd08cdf0b443297669fd94288fb5
-
SHA1
89e2519e2a0ff144f99e0f5d7a7419898e36ba77
-
SHA256
020740d11c15f7b3b5bbc2eef7e7237c91207089c06573fded479d03ab7f5092
-
SHA512
dc4e0b5fc15d5ce65d80792daffd2a8617b3079fd1a7877ca6e3c17cceb518972702b135524c076dd791d032e2f8247632cc43c4d0da296d12e0c38d1b439cc3
-
SSDEEP
12288:6cCgZn/cCgZnbWwyQNqi7KwjFfk4RpNBJ7djjWH2y0uc:6cDZn/cDZni5W7KwjiejWjc
Score3/10 -