MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5be83d13f20b4a044a8c8281d13723a808555cdd73a7ddcec37422a4e44fbd4e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkGate


Vendor detections: 6


Intelligence 6 IOCs YARA 4 File information Comments

SHA256 hash: 5be83d13f20b4a044a8c8281d13723a808555cdd73a7ddcec37422a4e44fbd4e
SHA3-384 hash: 41ce28126b5f51d28835d5b5dfc7dceb927fb5f1ed7c7a29aefb9387a343ff9d064eacbed8797f4bea1ab9f36b1d9c6c
SHA1 hash: d25e55d1eed18e55557ee9da7d195748dd2814f0
MD5 hash: 9f3a752331bb865a82498b80ec23cdfd
humanhash: colorado-oscar-bulldog-jersey
File name:dig region poonch operator details.msi
Download: download sample
Signature DarkGate
File size:1'953'792 bytes
First seen:2023-08-09 21:22:03 UTC
Last seen:2023-08-09 21:28:24 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:UtncpVGPCNI3/EWVyGalaWXF1Co8yaQSP0fLsoUrftnylpfCBQHPsJ7ON6UPHbEf:9pUPCe3/7AqWV1JDaQi09YQHPsSHbW
Threatray 82 similar samples on MalwareBazaar
TLSH T11895CF42B3B581E7FF5771365ECAF25A1278ED580F12E25F1BDC3D69A4301E126A8322
TrID 86.3% (.MSI) Microsoft Windows Installer (454500/1/170)
8.4% (.MSP) Windows Installer Patch (44509/10/5)
3.7% (.WPS) Kingsoft WPS Office document (alt.) (19502/3/2)
1.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter 1ZRR4H
Tags:178.33.94.35 DarkGate msi

Intelligence


File Origin
# of uploads :
2
# of downloads :
178
Origin country :
CA CA
Vendor Threat Intelligence
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
autoit control expand fingerprint lolbin packed shell32
Result
Threat name:
Darkgate
Detection:
malicious
Classification:
troj.spyw.evad
Score:
76 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Contains functionality to modify clipboard data
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Yara detected Darkgate
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1288994 Sample: dig_region_poonch_operator_... Startdate: 09/08/2023 Architecture: WINDOWS Score: 76 48 sanibroadbandcommunicton.duckdns.org 2->48 52 Yara detected Darkgate 2->52 54 Sample uses string decryption to hide its real strings 2->54 56 Connects to many ports of the same IP (likely port scanning) 2->56 58 4 other signatures 2->58 9 msiexec.exe 4 20 2->9         started        12 Autoit3.exe 2->12         started        14 msiexec.exe 6 2->14         started        signatures3 process4 file5 42 C:\Windows\Installer\MSIBAF9.tmp, PE32 9->42 dropped 44 C:\Windows\Installer\MSIA92B.tmp, PE32 9->44 dropped 16 msiexec.exe 5 9->16         started        18 cmd.exe 12->18         started        process6 process7 20 Autoit3.exe 8 16->20         started        24 expand.exe 4 16->24         started        26 mscorsvw.exe 2 16->26         started        28 2 other processes 16->28 file8 36 C:\temp\AutoIt3.exe, PE32 20->36 dropped 60 Contains functionality to modify clipboard data 20->60 30 cmd.exe 3 20->30         started        34 WINWORD.EXE 312 12 20->34         started        38 C:\Users\user\AppData\...\Autoit3.exe (copy), PE32 24->38 dropped 40 C:\...\6281f9c032caea418345a175506a7a4e.tmp, PE32 24->40 dropped signatures9 process10 dnsIp11 50 sanibroadbandcommunicton.duckdns.org 178.33.94.35, 49161, 49162, 49163 OVHFR France 30->50 46 C:\ProgramData\fdhbkkc\Autoit3.exe, PE32 30->46 dropped file12
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Enumerates connected drives
Drops startup file
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Script
Author:@bartblaze
Description:Identifies AutoIT script.
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_OLE_file_magic_number
Author:Didier Stevens (https://DidierStevens.com)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments