MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b608a6729343cf8b6752d5bb201f906920fcb472f5949e04173b907f65ceff1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkGate


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 5b608a6729343cf8b6752d5bb201f906920fcb472f5949e04173b907f65ceff1
SHA3-384 hash: f8783ff479d5750a624baf231caeda8e28f12ae298506b10ca6a5c84f2a9f771bdfcf86a7a24eea678eacaf1ba3eeda4
SHA1 hash: edc5d0dc190dcd0e031e2c5b43026fd3a61caed0
MD5 hash: 394f500a708c457b2a5eb4e839896c22
humanhash: avocado-wolfram-solar-east
File name:no_halt_7891.msi
Download: download sample
Signature DarkGate
File size:1'916'928 bytes
First seen:2023-07-24 21:03:27 UTC
Last seen:2023-07-25 12:59:58 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:HtncpVGPoI9FsEsyt8l+E+s1tB7parWM0RzDohAR5uwdtKiYn:2pUPp9FBJZEH1X1arF0KSg1
Threatray 1 similar samples on MalwareBazaar
TLSH T12295AF0327958436EF8F61361779B71A1AB87C55C322E07F26483F69A87CE60197DF22
TrID 89.6% (.MSI) Microsoft Windows Installer (454500/1/170)
8.7% (.MSP) Windows Installer Patch (44509/10/5)
1.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter k3dg3___
Tags:80-66-88-145 DarkGate msi

Intelligence


File Origin
# of uploads :
2
# of downloads :
172
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw.evad
Score:
68 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Multi AV Scanner detection for domain / URL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1278709 Sample: no_halt_7891.msi Startdate: 24/07/2023 Architecture: WINDOWS Score: 68 57 Multi AV Scanner detection for domain / URL 2->57 59 Connects to many ports of the same IP (likely port scanning) 2->59 61 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->61 63 Uses known network protocols on non-standard ports 2->63 9 msiexec.exe 12 22 2->9         started        12 Autoit3.exe 2->12         started        14 msiexec.exe 5 2->14         started        process3 file4 47 C:\Windows\Installer\MSIF673.tmp, PE32 9->47 dropped 49 C:\Windows\Installer\MSI35A2.tmp, PE32 9->49 dropped 16 msiexec.exe 5 9->16         started        18 cmd.exe 12->18         started        process5 process6 20 Autoit3.exe 7 16->20         started        24 expand.exe 5 16->24         started        26 Uninstall.exe 16->26         started        28 2 other processes 16->28 file7 41 C:\temp\AutoIt3.exe, PE32 20->41 dropped 65 Contains functionality to modify clipboard data 20->65 30 cmd.exe 3 20->30         started        43 C:\Users\user\AppData\...\Autoit3.exe (copy), PE32 24->43 dropped 45 C:\...\39d241a9be9d9f4f9d3d024e5305a1a6.tmp, PE32 24->45 dropped signatures8 process9 dnsIp10 53 80.66.88.145, 49182, 49183, 49184 RISS-ASRU Russian Federation 30->53 51 C:\ProgramData\hefahbb\Autoit3.exe, PE32 30->51 dropped 55 Creates a thread in another existing process (thread injection) 30->55 35 RdrServicesUpdater.exe 30->35         started        37 mip.exe 30->37         started        39 AdobeCollabSync.exe 30->39         started        file11 signatures12 process13
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-07-24 21:04:06 UTC
File Type:
Binary (Archive)
Extracted files:
56
AV detection:
5 of 37 (13.51%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Drops file in Windows directory
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Script
Author:@bartblaze
Description:Identifies AutoIT script.
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments