General

  • Target

    sync.msi

  • Size

    3.6MB

  • Sample

    231018-t38hbsgc9y

  • MD5

    6550b181486c080b7c524bec6370d85d

  • SHA1

    b54ca1ad61df207e0aa3215cb58e362886f68095

  • SHA256

    143c1f6a1095fd6f63eae25d3b2cee9ba800c47b48279c8f7c62609118cc4299

  • SHA512

    13453e3777583540449225d83c6ca8838da905ec6067312488c23cc36d3f387e772f5716c4a4778ddc5a5302aa4cda1eef983e6d76e3c414aaa5d4a32a544ea2

  • SSDEEP

    98304:TpA1DCG1G1w7cwv9JAEh7DyU35oGFYGHnzzMBdHB3:gE+dvLAEh7DyU35oGFTHz4B/3

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://cheneseemeg7575.cash

http://annoyingannoying.vodka

http://uiahbmajokriswhoer.net

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    bfpKQguIjifOez

  • internal_mutex

    txtMut

  • minimum_disk

    35

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      sync.msi

    • Size

      3.6MB

    • MD5

      6550b181486c080b7c524bec6370d85d

    • SHA1

      b54ca1ad61df207e0aa3215cb58e362886f68095

    • SHA256

      143c1f6a1095fd6f63eae25d3b2cee9ba800c47b48279c8f7c62609118cc4299

    • SHA512

      13453e3777583540449225d83c6ca8838da905ec6067312488c23cc36d3f387e772f5716c4a4778ddc5a5302aa4cda1eef983e6d76e3c414aaa5d4a32a544ea2

    • SSDEEP

      98304:TpA1DCG1G1w7cwv9JAEh7DyU35oGFYGHnzzMBdHB3:gE+dvLAEh7DyU35oGFTHz4B/3

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks