General

  • Target

    1.msi

  • Size

    1.8MB

  • Sample

    231011-xnwrrsfe5t

  • MD5

    d402f30e4f9bc2f6d470384591bf9b34

  • SHA1

    37f73ff4f0bb88ddd5605cf696e8947d63a79c97

  • SHA256

    08c31ed8f0574544769c024a57bc57daa9e444f57845ebd41b2a5213901d4667

  • SHA512

    290a714cefa8ebf375ab439bf4e4083c93d49d843c39d9b83a2fe03e13619e425066becabadfb0491192ebd2b7bfad6fc6c407c40af8800293a2a4a59b011dba

  • SSDEEP

    49152:epUPfjpSNeHaHGYayNId4pWL56Hq05vHjYL57CBN4/6sT:epeeHGKId+W1n6/01kN4ysT

Malware Config

Extracted

Family

darkgate

Botnet

AA11

C2

http://94.228.169.143

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    bABouSDRyBocvj

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    AA11

Targets

    • Target

      1.msi

    • Size

      1.8MB

    • MD5

      d402f30e4f9bc2f6d470384591bf9b34

    • SHA1

      37f73ff4f0bb88ddd5605cf696e8947d63a79c97

    • SHA256

      08c31ed8f0574544769c024a57bc57daa9e444f57845ebd41b2a5213901d4667

    • SHA512

      290a714cefa8ebf375ab439bf4e4083c93d49d843c39d9b83a2fe03e13619e425066becabadfb0491192ebd2b7bfad6fc6c407c40af8800293a2a4a59b011dba

    • SSDEEP

      49152:epUPfjpSNeHaHGYayNId4pWL56Hq05vHjYL57CBN4/6sT:epeeHGKId+W1n6/01kN4ysT

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks