General

  • Target

    1.msi

  • Size

    1.8MB

  • Sample

    231011-q496rscg37

  • MD5

    691cb50fb8459ffacfcb82cfacb6feb6

  • SHA1

    e43e20c942ad06433ffee8ec7b04bb384973d5d7

  • SHA256

    b9aeb7f233ebc00cfe8be8832a8eb48d2c1e5bfa69cfdba4ecc9ee054e55b59f

  • SHA512

    a9ea4d3cc045a9ee9379a76469356d12b17279eb3194bf3f39f07cd3fc15b180200f88a78fb84ecec04ba83e4eeca30752b842df7534402de1203ec42a898f38

  • SSDEEP

    49152:epUPfjpSNeHaHGYayNId4pWL56Hq05vHjYL57CBN4/6sT:epeeHGKId+W1n6/01kN4ysT

Malware Config

Extracted

Family

darkgate

Botnet

AA11

C2

http://94.228.169.143

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    bABouSDRyBocvj

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    AA11

Targets

    • Target

      1.msi

    • Size

      1.8MB

    • MD5

      691cb50fb8459ffacfcb82cfacb6feb6

    • SHA1

      e43e20c942ad06433ffee8ec7b04bb384973d5d7

    • SHA256

      b9aeb7f233ebc00cfe8be8832a8eb48d2c1e5bfa69cfdba4ecc9ee054e55b59f

    • SHA512

      a9ea4d3cc045a9ee9379a76469356d12b17279eb3194bf3f39f07cd3fc15b180200f88a78fb84ecec04ba83e4eeca30752b842df7534402de1203ec42a898f38

    • SSDEEP

      49152:epUPfjpSNeHaHGYayNId4pWL56Hq05vHjYL57CBN4/6sT:epeeHGKId+W1n6/01kN4ysT

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks