General

  • Target

    w_verion_6.1.1_x86.msi

  • Size

    2.2MB

  • Sample

    231013-d1wgzsce7w

  • MD5

    27a14ed7a94bbbf8dabacd509cb4bf0f

  • SHA1

    097c6021a05ae5dc95a3b6e4dc4deb2583a8b26a

  • SHA256

    8ce6620ef7346fbb807b72293ce965b05b5cd37036a9d3a17c834b79e15910f4

  • SHA512

    78c9d918d17eff9b5662c97adae0942722f64a3864c61e8cd3999dd7210ca9a2b34ab1380ae61091c4fee3602a45f6b6034b9b34580977801de8e2e5beee5f70

  • SSDEEP

    49152:QpUPhzTtpSD6TmCFMZ9Iv1s6kXhH3jtG1+iH4nDcGdi2gzblP9QNIT5QBtg2:QpgntID67vvLkX5BGVOfcblFQCS

Malware Config

Extracted

Family

darkgate

Botnet

ioeooow8ur

C2

http://cdn-ext.net

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    nEtvEVFAjZwGiB

  • internal_mutex

    cbdKcC

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ioeooow8ur

Targets

    • Target

      w_verion_6.1.1_x86.msi

    • Size

      2.2MB

    • MD5

      27a14ed7a94bbbf8dabacd509cb4bf0f

    • SHA1

      097c6021a05ae5dc95a3b6e4dc4deb2583a8b26a

    • SHA256

      8ce6620ef7346fbb807b72293ce965b05b5cd37036a9d3a17c834b79e15910f4

    • SHA512

      78c9d918d17eff9b5662c97adae0942722f64a3864c61e8cd3999dd7210ca9a2b34ab1380ae61091c4fee3602a45f6b6034b9b34580977801de8e2e5beee5f70

    • SSDEEP

      49152:QpUPhzTtpSD6TmCFMZ9Iv1s6kXhH3jtG1+iH4nDcGdi2gzblP9QNIT5QBtg2:QpgntID67vvLkX5BGVOfcblFQCS

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks