File name:

DarkX2.zip

Full analysis: https://app.any.run/tasks/64f65d3b-22d9-4131-84d9-ae86ef090340
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 08, 2025, 20:54:00
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
upx
golang
salatstealer
arch-exec
discord
evasion
ims-api
generic
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

8EF2838AE4FCF08159782EB2F261D2A7

SHA1:

09EB2C36741AA4037A9DD78639C9B6B4A3CB9494

SHA256:

353F0074FB11D0E209E051B186CBB677D5BAAFAADCC5D94E3667572F73DB24A2

SSDEEP:

98304:YRjOzq3idYNB1LGAH7eSdel/U+iqCgXs3ntpJYfdZQH4DkdwMcpl1aJ53MP4vvrT:1CgNHVs+MlEHJVOal/u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SALATSTEALER has been detected (YARA)

      • DarkX2.exe (PID: 6372)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1188)
      • DarkX2.exe (PID: 5428)
    • Application launched itself

      • DarkX2.exe (PID: 5428)
    • Multiple wallet extension IDs have been found

      • DarkX2.exe (PID: 6372)
    • There is functionality for taking screenshot (YARA)

      • DarkX2.exe (PID: 6372)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • darkx-loader.exe (PID: 1012)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • darkx-loader.exe (PID: 1012)
  • INFO

    • Reads the computer name

      • DarkX2.exe (PID: 5428)
      • darkx-loader.exe (PID: 1012)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1188)
    • Reads the machine GUID from the registry

      • DarkX2.exe (PID: 5428)
      • DarkX2.exe (PID: 6372)
    • Checks supported languages

      • DarkX2.exe (PID: 5428)
      • DarkX2.exe (PID: 6372)
      • darkx-loader.exe (PID: 1012)
    • Process checks computer location settings

      • DarkX2.exe (PID: 5428)
    • Detects GO elliptic curve encryption (YARA)

      • DarkX2.exe (PID: 6372)
    • Application based on Golang

      • DarkX2.exe (PID: 6372)
    • UPX packer has been detected

      • DarkX2.exe (PID: 6372)
    • Checks proxy server information

      • darkx-loader.exe (PID: 1012)
    • Reads the software policy settings

      • darkx-loader.exe (PID: 1012)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(1012) darkx-loader.exe
Discord-Webhook-Tokens (1)1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
Discord-Info-Links
1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
Get Webhook Infohttps://discord.com/api/webhooks/1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:04:08 23:52:38
ZipCRC: 0xdc47b21b
ZipCompressedSize: 14
ZipUncompressedSize: 14
ZipFileName: PASSWORD: 9982
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
6
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe darkx2.exe no specs #SALATSTEALER darkx2.exe darkx-loader.exe svchost.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1012"C:\Users\admin\AppData\Local\Temp\Rar$EXb1188.48518\darkx-loader.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb1188.48518\darkx-loader.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
darkx-loader
Version:
0.1.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb1188.48518\darkx-loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
ims-api
(PID) Process(1012) darkx-loader.exe
Discord-Webhook-Tokens (1)1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
Discord-Info-Links
1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
Get Webhook Infohttps://discord.com/api/webhooks/1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
1188"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\DarkX2.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5428"C:\Users\admin\AppData\Local\Temp\Rar$EXb1188.46282\DarkX2.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb1188.46282\DarkX2.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb1188.46282\darkx2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\bcryptprimitives.dll
6032C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6372"C:\Users\admin\AppData\Local\Temp\Rar$EXb1188.46282\DarkX2.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb1188.46282\DarkX2.exe
DarkX2.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb1188.46282\darkx2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\bcryptprimitives.dll
Total events
3 072
Read events
3 062
Write events
10
Delete events
0

Modification events

(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\DarkX2.zip
(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
4
Suspicious files
0
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
1188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1188.46282\PASSWORD_ 9982text
MD5:2EEBD045D8D6ADFAFCD5A601C224CE81
SHA256:0ED3C7DE3C840C60A3AA6B4F61F434617367EAB578E05E2AF784699B5496F2F0
1188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1188.48518\ПАРОЛЬ_ 9982text
MD5:2EEBD045D8D6ADFAFCD5A601C224CE81
SHA256:0ED3C7DE3C840C60A3AA6B4F61F434617367EAB578E05E2AF784699B5496F2F0
1188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1188.46282\ПАРОЛЬ_ 9982text
MD5:2EEBD045D8D6ADFAFCD5A601C224CE81
SHA256:0ED3C7DE3C840C60A3AA6B4F61F434617367EAB578E05E2AF784699B5496F2F0
1188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1188.48518\PASSWORD_ 9982text
MD5:2EEBD045D8D6ADFAFCD5A601C224CE81
SHA256:0ED3C7DE3C840C60A3AA6B4F61F434617367EAB578E05E2AF784699B5496F2F0
1188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1188.46282\DarkX2.exeexecutable
MD5:818F81F49A9EDC34B0F767AFD0162FE6
SHA256:64CC4AE2575CCA7598A4017895F16789D89B5D517741BA8A0DBDBFE144CC97A8
1188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1188.46282\darkx-loader.exeexecutable
MD5:9CC6369458F47950B03647315D5A05E3
SHA256:21E284F6C3C71621CF02CE7DD888B6EB5BC896412FC12E93DEE78870C304C6CE
1188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1188.48518\darkx-loader.exeexecutable
MD5:9CC6369458F47950B03647315D5A05E3
SHA256:21E284F6C3C71621CF02CE7DD888B6EB5BC896412FC12E93DEE78870C304C6CE
1188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1188.48518\DarkX2.exeexecutable
MD5:818F81F49A9EDC34B0F767AFD0162FE6
SHA256:64CC4AE2575CCA7598A4017895F16789D89B5D517741BA8A0DBDBFE144CC97A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
25
DNS requests
13
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1616
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1616
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1012
darkx-loader.exe
GET
200
208.95.112.1:80
http://208.95.112.1:80/json/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6392
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6372
DarkX2.exe
188.114.97.3:443
unknown
6372
DarkX2.exe
1.1.1.1:443
whitelisted
6372
DarkX2.exe
104.21.32.1:443
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.48.23.176
  • 23.48.23.193
  • 23.48.23.159
  • 23.48.23.183
  • 23.48.23.194
  • 23.48.23.181
  • 23.48.23.162
  • 23.48.23.190
  • 23.48.23.164
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
discord.com
  • 162.159.137.232
  • 162.159.128.233
  • 162.159.135.232
  • 162.159.138.232
  • 162.159.136.232
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
1012
darkx-loader.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2196
svchost.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
1012
darkx-loader.exe
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
1012
darkx-loader.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
No debug info