MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkGate


Vendor detections: 17


Intelligence 17 IOCs YARA 4 File information Comments

SHA256 hash: 48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
SHA3-384 hash: 229ab444d523cc85ea7cbab52a7eb192ca48df0c9fc3065270eff27de166599c8f6aea8d9acdc9c4c2b5284e33d5b441
SHA1 hash: 72c3ae0ed953a4ed3a5d1d8e3957f530c952f48d
MD5 hash: fc99ddf185aa553bf30c431cc897c903
humanhash: princess-juliet-triple-helium
File name:SecuriteInfo.com.Variant.Fragtor.599953.20231.7803
Download: download sample
Signature DarkGate
File size:2'234'880 bytes
First seen:2024-08-06 22:23:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6482a570ab38408826cbdcd4c99083d1 (1 x DarkGate)
ssdeep 49152:Uk8BMMcyO6uzNJbIdNJbnwppkcWAta0PH1i:HasZ6uJJb6UJNa0
TLSH T147A5DFD0BF7864A3D1E104B6B49BB2F8782369A48F458BCB52BC95161D188C35FF6363
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter SecuriteInfoCom
Tags:DarkGate exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
431
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Variant.Fragtor.599953.20231.7803
Verdict:
Malicious activity
Analysis date:
2024-08-07 01:46:26 UTC
Tags:
evasion telegram

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Discovery Execution Infostealer Network Stealth Trojan Redcap
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Connection attempt
Sending an HTTP GET request
Sending a custom TCP request
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Creating a process from a recently created file
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Running batch commands
Launching a process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
crypto epmicrosoft_visual_cc fingerprint lolbin microsoft_visual_cc packed redcap remote
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkGate, MailPassView
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Yara detected DarkGate
Yara detected MailPassView
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1489138 Sample: SecuriteInfo.com.Variant.Fr... Startdate: 07/08/2024 Architecture: WINDOWS Score: 100 28 api.telegram.org 2->28 30 myexternalip.com 2->30 40 Found malware configuration 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected DarkGate 2->44 48 5 other signatures 2->48 10 SecuriteInfo.com.Variant.Fragtor.599953.20231.7803.exe 13 2->10         started        signatures3 46 Uses the Telegram API (likely for C&C communication) 28->46 process4 dnsIp5 32 api.telegram.org 149.154.167.220, 443, 49733 TELEGRAMRU United Kingdom 10->32 34 myexternalip.com 34.160.111.145, 49730, 80 ATGS-MMD-ASUS United States 10->34 36 127.0.0.1 unknown unknown 10->36 50 Found stalling execution ending in API Sleep call 10->50 52 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 10->52 54 Contains functionality to inject code into remote processes 10->54 56 Injects a PE file into a foreign processes 10->56 14 SecuriteInfo.com.Variant.Fragtor.599953.20231.7803.exe 3 10->14         started        signatures6 process7 file8 26 C:\temp2\Autoit3.exe, PE32 14->26 dropped 17 Autoit3.exe 4 14->17         started        process9 signatures10 38 Contains functionality to inject threads in other processes 17->38 20 cmd.exe 2 17->20         started        process11 process12 22 WMIC.exe 1 20->22         started        24 conhost.exe 20->24         started       
Threat name:
Win32.Trojan.DarkGate
Status:
Malicious
First seen:
2024-08-06 19:47:04 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
darkgate
Score:
  10/10
Tags:
family:darkgate botnet:gh0st discovery execution stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Command and Scripting Interpreter: AutoIT
Suspicious use of SetThreadContext
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
DarkGate
Detect DarkGate stealer
Malware Config
C2 Extraction:
filetmoon.site
Unpacked files
SH256 hash:
e439f02b72a882498d512689f380e1323c4d8342578fe8608e81061cf4a8aee1
MD5 hash:
3d90ab79b9719aded136b7cd437ebb21
SHA1 hash:
dbec6e868a293cb0bd58d35191b1423ab8942384
Detections:
AutoIT_Compiled
SH256 hash:
5a21f6904e2b24c51d9793ffc3d5eaa6f184367714190fcc8cf919b2264c05c0
MD5 hash:
8aae0d2a1427ebe54a7cc6cbe78049be
SHA1 hash:
b32bfd072c72bd637cc0c915902ef05124dbdfc2
Detections:
AutoIT_Compiled SUSP_XORed_URL_In_EXE SUSP_XORed_MSDOS_Stub_Message SUSP_XORed_Mozilla
SH256 hash:
48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
MD5 hash:
fc99ddf185aa553bf30c431cc897c903
SHA1 hash:
72c3ae0ed953a4ed3a5d1d8e3957f530c952f48d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DarkGate

Executable exe 48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::SetProcessShutdownParameters
KERNEL32.dll::CloseHandle
WININET.dll::InternetCloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDriveTypeW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileExW
KERNEL32.dll::GetSystemDirectoryW
KERNEL32.dll::GetFileAttributesW
WIN_BCRYPT_APICan Encrypt Filesbcrypt.dll::BCryptGenRandom
WIN_CRYPT_APIUses Windows Crypt APICRYPT32.dll::CertAddCertificateContextToStore
CRYPT32.dll::CertCreateCertificateChainEngine
CRYPT32.dll::CertEnumCertificatesInStore
CRYPT32.dll::CertFindCertificateInStore
CRYPT32.dll::CertFindExtension
CRYPT32.dll::CertFreeCertificateChainEngine
CRYPT32.dll::CertFreeCertificateChain
WIN_SOCK_APIUses Network to send and receive dataWS2_32.dll::freeaddrinfo
WS2_32.dll::getaddrinfo
WS2_32.dll::WSACloseEvent
WS2_32.dll::WSACreateEvent
WS2_32.dll::WSAEnumNetworkEvents
WS2_32.dll::WSAEventSelect

Comments