General

  • Target

    19102023_0007_destroy.zip

  • Size

    3.4MB

  • Sample

    231018-tk815sga3t

  • MD5

    aeb585bf08b61eec4d09653fa05f6f2c

  • SHA1

    317d79cced597366dcd41b0f9c4ba9691dbb2055

  • SHA256

    6d9afd0f1344222b7eef020dd05a1d51698f4d3786728dbe83d0efdcfd5c2035

  • SHA512

    fa49fc1609126b7397359d18172889c891f03f51421e103895f80e67ef9f405fc74d4781ae6ecdd5dfaf685f334e6661dc4fe104358f7974e9b259e2f0ef82d5

  • SSDEEP

    98304:u/DCGLGJIh0a/9XmCvMelHXFoouqc8+mjmN/5:4Eu5/JmCk4XFoouqN1mx5

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://cheneseemeg7575.cash

http://annoyingannoying.vodka

http://uiahbmajokriswhoer.net

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    TDoGTDSWKFuYaM

  • internal_mutex

    txtMut

  • minimum_disk

    35

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      destroy.msi

    • Size

      3.6MB

    • MD5

      c5dacb642fc9c905f9c29e8c3666ecae

    • SHA1

      21c21c7aff42ded891f2c69bb03f5a7d65758ea9

    • SHA256

      2c33166a74ba155a80bb28dcb1fa905ff8cce2dd19464d5784e863478facade5

    • SHA512

      97d82b1bc70d7368a68ee1af746ee8aaa45cce7150b94185818656bf6d1c4217043b004e01b73a8348d7f7e1803fead1cdfe2b3ce1d11d119e06ab5f439f482b

    • SSDEEP

      98304:cpG1DCG1G1w7cwv9JAEJUvXF/rFmoyqcUQc1ShZ:zE+dvLAEilrFmoyqdFSL

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks