MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 74c69940f96ccad21c7bfa75d6ee8dec4a78b16e0a32abe104d24c2076a574d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkGate


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 74c69940f96ccad21c7bfa75d6ee8dec4a78b16e0a32abe104d24c2076a574d5
SHA3-384 hash: be2a2f67ed3a0770d0302ee879d3ea09efec4de531f69d4847244670801d574dafc5d290957e07da0d5b528dd2544e82
SHA1 hash: 4d74de5d8a269eb22bdc2ab3563d7fd4f819d1a9
MD5 hash: 3a0baa797d0f1c7fb1d4eb267debe554
humanhash: undress-pluto-november-six
File name:case_-2023_4824647818.pdf
Download: download sample
Signature DarkGate
File size:76'223 bytes
First seen:2024-02-12 17:11:02 UTC
Last seen:Never
File type: pdf
MIME type:application/pdf
ssdeep 1536:v2nPukT9krbpxMOTFyVA1fsYvJSA3H+podVVV7:vUPukBSkOTFy3YvvB7
TLSH T1D673E11676AC6854D4178AAADC19372944ACB23E55C470CF707B07C72AA3C10BB6DFAF
Reporter k3dg3___
Tags:admin888 DarkGate pdf TA571

Intelligence


File Origin
# of uploads :
1
# of downloads :
583
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
phishing
Label:
Benign
Suspicious Score:
4.5/10
Score Malicious:
46%
Score Benign:
54%
Result
Verdict:
MALICIOUS
Details
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Document With Minimal Content
Document contains less than 1 kilobyte of semantic information.
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Downloads suspicious files via Chrome
Malicious sample detected (through community Yara rule)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1390982 Sample: case_-2023_4824647818.pdf Startdate: 12/02/2024 Architecture: WINDOWS Score: 52 42 Malicious sample detected (through community Yara rule) 2->42 44 Downloads suspicious files via Chrome 2->44 8 chrome.exe 16 2->8         started        12 Acrobat.exe 18 79 2->12         started        process3 dnsIp4 38 192.168.2.6, 443, 49175, 49251 unknown unknown 8->38 40 239.255.255.250 unknown Reserved 8->40 28 case_2024-02-11_18-03-35-0558.zip (copy), Zip 8->28 dropped 14 unarchiver.exe 4 8->14         started        16 chrome.exe 8->16         started        19 AcroCEF.exe 105 12->19         started        file5 process6 dnsIp7 21 7za.exe 3 14->21         started        30 selectwendormo9tres.com 94.131.118.130, 443, 49722 NASSIST-ASGI Ukraine 16->30 32 adclick.g.doubleclick.net 108.177.122.155, 443, 49718, 49719 GOOGLEUS United States 16->32 34 9 other IPs or domains 16->34 23 AcroCEF.exe 2 19->23         started        process8 dnsIp9 26 conhost.exe 21->26         started        36 184.25.164.138, 443, 49709 BBIL-APBHARTIAirtelLtdIN United States 23->36 process10
Threat name:
Document-PDF.Trojan.Darkgate
Status:
Suspicious
First seen:
2024-02-12 17:12:04 UTC
File Type:
Document
Extracted files:
13
AV detection:
9 of 23 (39.13%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkGate

pdf 74c69940f96ccad21c7bfa75d6ee8dec4a78b16e0a32abe104d24c2076a574d5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments