General

  • Target

    8f82b80d2996a27e5efd72c1748a6048

  • Size

    2.8MB

  • Sample

    231019-zvspssdc52

  • MD5

    8f82b80d2996a27e5efd72c1748a6048

  • SHA1

    7c3deb150d73fe97e8efd1086bd42dca859a4766

  • SHA256

    d0a0a3ac8865737a917983d10cf7307ed235aa4102d146f6858818694ab8f3f4

  • SHA512

    9f476032cf5dbdfa57d2fa34deb8330eca8b118ffcfb344f013437758311cd390f51c5ca803a2cef93bf9b54854451362a68e1fac16a330e39479a14a32df69d

  • SSDEEP

    49152:KpUPZCQMukBtM5X1nMg1Y6PWG0QIaqZQxxWsprXhTrdMqsI1Jqf1vOEMH+3iplvB:Kp2czg71Y6PWGZIaOYxWs1hTrdMqvJqg

Malware Config

Extracted

Family

darkgate

Botnet

civilian1337

C2

http://185.130.227.202

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    HLzTkCBjqtAfzL

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    civilian1337

Targets

    • Target

      8f82b80d2996a27e5efd72c1748a6048

    • Size

      2.8MB

    • MD5

      8f82b80d2996a27e5efd72c1748a6048

    • SHA1

      7c3deb150d73fe97e8efd1086bd42dca859a4766

    • SHA256

      d0a0a3ac8865737a917983d10cf7307ed235aa4102d146f6858818694ab8f3f4

    • SHA512

      9f476032cf5dbdfa57d2fa34deb8330eca8b118ffcfb344f013437758311cd390f51c5ca803a2cef93bf9b54854451362a68e1fac16a330e39479a14a32df69d

    • SSDEEP

      49152:KpUPZCQMukBtM5X1nMg1Y6PWG0QIaqZQxxWsprXhTrdMqsI1Jqf1vOEMH+3iplvB:Kp2czg71Y6PWGZIaOYxWs1hTrdMqvJqg

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks