MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkGate


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8
SHA3-384 hash: f7ce9963e20ca1cc106023a9c2c0c04929a8213d256a231c5cd257136523f6c37212a4da2fcbc190bddc750a3c776b78
SHA1 hash: 6758f0170b8227ad373ec35e12e6f300f2f27b42
MD5 hash: 0bd370eef60a45fd61634df249b64b91
humanhash: yankee-blue-four-kitten
File name:86114406553868.csv.exe
Download: download sample
Signature DarkGate
File size:3'624'918 bytes
First seen:2024-08-18 09:02:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 40ab50289f7ef5fae60801f88d4541fc (59 x ValleyRAT, 49 x Gh0stRAT, 41 x OffLoader)
ssdeep 49152:XwREDDMeGGezwQbVqL+ecrCkwYw4z0g3QjfkRiGqUydHeMxWrP+beY7UY714:XwREBGGezfI2hwYDzJQ7UqzdMwZgN
Threatray 31 similar samples on MalwareBazaar
TLSH T12FF5F112E1EED87ED9DD1B360163918430FB3914A0266D179BECF9D8CE34A326D6E11B
TrID 39.3% (.EXE) Inno Setup installer (107240/4/30)
21.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
15.7% (.EXE) InstallShield setup (43053/19/16)
15.2% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.8% (.EXE) Win64 Executable (generic) (10523/12/4)
File icon (PE):PE icon
dhash icon 5050d270cccc82ae (109 x Adware.Generic, 43 x LummaStealer, 42 x OffLoader)
Reporter s1dhy
Tags:DarkGate exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
494
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
86114406553868.csv.exe
Verdict:
Malicious activity
Analysis date:
2024-08-18 08:58:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Execution Network Stealth Trojan
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkGate, MailPassView
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found malware configuration
Opens the same file many times (likely Sandbox evasion)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected DarkGate
Yara detected MailPassView
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1494398 Sample: 86114406553868.csv.exe Startdate: 18/08/2024 Architecture: WINDOWS Score: 96 50 version6dkgate.duckdns.org 2->50 56 Found malware configuration 2->56 58 Yara detected DarkGate 2->58 60 Yara detected MailPassView 2->60 64 5 other signatures 2->64 11 86114406553868.csv.exe 2 2->11         started        signatures3 62 Uses dynamic DNS services 50->62 process4 file5 44 C:\Users\user\...\86114406553868.csv.tmp, PE32 11->44 dropped 14 86114406553868.csv.tmp 3 5 11->14         started        process6 file7 46 C:\Users\user\AppData\Local\...\Autoit3.exe, PE32 14->46 dropped 48 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 14->48 dropped 17 Autoit3.exe 10 14->17         started        process8 file9 42 C:\ProgramData\ehdedfg\Autoit3.exe, PE32 17->42 dropped 54 Writes to foreign memory regions 17->54 21 GoogleUpdateCore.exe 1 4 17->21         started        25 cmd.exe 2 17->25         started        27 GoogleUpdateCore.exe 17->27         started        signatures10 process11 dnsIp12 52 version6dkgate.duckdns.org 178.33.94.35, 49763, 49767, 49768 OVHFR France 21->52 66 Opens the same file many times (likely Sandbox evasion) 21->66 29 GoogleUpdateCore.exe 1 21->29         started        32 GoogleUpdateCore.exe 21->32         started        34 WMIC.exe 1 25->34         started        36 conhost.exe 25->36         started        38 WerFault.exe 4 27->38         started        signatures13 process14 signatures15 68 Opens the same file many times (likely Sandbox evasion) 29->68 40 WerFault.exe 21 32->40         started        process16
Threat name:
Win32.Trojan.DarkGate
Status:
Malicious
First seen:
2024-08-18 09:03:16 UTC
File Type:
PE (Exe)
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
darkgate
Score:
  10/10
Tags:
family:darkgate botnet:seeksoul discovery execution persistence stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Command and Scripting Interpreter: AutoIT
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
DarkGate
Detect DarkGate stealer
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
version6dkgate.duckdns.org
Unpacked files
SH256 hash:
8dbc280bb47a8236bc6eb3a9023d76f883c5b25532304352f013140a48c9625e
MD5 hash:
0b1cc727831b3938eba4a4d5d844680c
SHA1 hash:
d2ea4d29cabfe699cade10208b03782f3e86597d
SH256 hash:
e439f02b72a882498d512689f380e1323c4d8342578fe8608e81061cf4a8aee1
MD5 hash:
3d90ab79b9719aded136b7cd437ebb21
SHA1 hash:
dbec6e868a293cb0bd58d35191b1423ab8942384
Detections:
AutoIT_Compiled
SH256 hash:
1110b730255564cb5b6935de17b2a29ce52583428afcbb311225a81bfa261c28
MD5 hash:
64a95adbdf486b21c513382780dc46ee
SHA1 hash:
870eefddc0767c89c869d2c1b3194fef48d069ec
SH256 hash:
6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8
MD5 hash:
0bd370eef60a45fd61634df249b64b91
SHA1 hash:
6758f0170b8227ad373ec35e12e6f300f2f27b42
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DarkGate

Executable exe 6bef7c9809b35c7a2111872544e68aa29b8323f5936b6b1122c5f4138cf6e1e8

(this sample)

  
Dropping
DarkGate
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User Authorizationadvapi32.dll::AllocateAndInitializeSid
advapi32.dll::ConvertSidToStringSidW
advapi32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
advapi32.dll::EqualSid
advapi32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
advapi32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessW
advapi32.dll::OpenProcessToken
advapi32.dll::OpenThreadToken
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryExW
kernel32.dll::LoadLibraryW
kernel32.dll::GetDriveTypeW
kernel32.dll::GetVolumeInformationW
kernel32.dll::GetSystemInfo
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryW
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetWindowsDirectoryW
kernel32.dll::GetSystemDirectoryW
kernel32.dll::GetFileAttributesW
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExW
advapi32.dll::RegQueryValueExW
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageW
user32.dll::CreateWindowExW

Comments