General

  • Target

    p_terminal_x86_install.msi

  • Size

    2.2MB

  • Sample

    231016-ry2swagh7t

  • MD5

    40804163b8e3cb4cfb6dc6984a1e228f

  • SHA1

    41f971c1cbb03545225fa7816708bfb322fbba95

  • SHA256

    be69add1213202bc7a038a2cfb2cf8ece07eeaaf163c2e17873c54d303e3abfa

  • SHA512

    e1e751f0e82e464ab084222ba662aa9d756e4c99a60322dc52c39a216ceb68d94599c90fb98368ea3eb392a2ca8670bf449fb347855c7446db1045c3553d3c38

  • SSDEEP

    49152:hpUPh/aSZVfoL5/esFPZPEN5YYCusbwy19m3zca16l+:hpg/NHAosF6N5YYubNjCM+

Malware Config

Extracted

Family

darkgate

Botnet

ioeooow8ur

C2

http://178.236.247.102

Attributes
  • alternative_c2_port

    9999

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    27850

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    tBtKaLevvIIJyE

  • internal_mutex

    cbdKcC

  • minimum_disk

    50

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ioeooow8ur

Targets

    • Target

      p_terminal_x86_install.msi

    • Size

      2.2MB

    • MD5

      40804163b8e3cb4cfb6dc6984a1e228f

    • SHA1

      41f971c1cbb03545225fa7816708bfb322fbba95

    • SHA256

      be69add1213202bc7a038a2cfb2cf8ece07eeaaf163c2e17873c54d303e3abfa

    • SHA512

      e1e751f0e82e464ab084222ba662aa9d756e4c99a60322dc52c39a216ceb68d94599c90fb98368ea3eb392a2ca8670bf449fb347855c7446db1045c3553d3c38

    • SSDEEP

      49152:hpUPh/aSZVfoL5/esFPZPEN5YYCusbwy19m3zca16l+:hpg/NHAosF6N5YYubNjCM+

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks