General

  • Target

    NEAS.NEASc12c6dd22bbdf170dffd8278facbb834c692c8f5b319e863097869fe94541ba5msiunknown_JC.unknown

  • Size

    2.7MB

  • Sample

    231022-rdta1ahc9t

  • MD5

    de4cd45087a864576240af5d0cd33ee8

  • SHA1

    5629b3684d406e431c6f41c5df56455c3b944c41

  • SHA256

    c12c6dd22bbdf170dffd8278facbb834c692c8f5b319e863097869fe94541ba5

  • SHA512

    8a4e5f40ce5cb7d0eedbcbf142bf05f7fe8da4e579c9b6581acacb1158efb0c0a216bf477cad6cabcd3fab16fd44ec534209d44994e3d6fae5ee7c388c6927db

  • SSDEEP

    49152:GpUPLCQMukBtM5X1nMg1YkStdn6MfBDShK10/doJMzSoj1wPMkncgBWfQ8bpCrbU:GpAczg71YkDMfYhpFEMzHYMqcYWJbUrY

Malware Config

Extracted

Family

darkgate

Botnet

ADS5

C2

http://sftp.bitepieces.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    cMRrocZshCGeXq

  • internal_mutex

    txtMut

  • minimum_disk

    30

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ADS5

Targets

    • Target

      NEAS.NEASc12c6dd22bbdf170dffd8278facbb834c692c8f5b319e863097869fe94541ba5msiunknown_JC.unknown

    • Size

      2.7MB

    • MD5

      de4cd45087a864576240af5d0cd33ee8

    • SHA1

      5629b3684d406e431c6f41c5df56455c3b944c41

    • SHA256

      c12c6dd22bbdf170dffd8278facbb834c692c8f5b319e863097869fe94541ba5

    • SHA512

      8a4e5f40ce5cb7d0eedbcbf142bf05f7fe8da4e579c9b6581acacb1158efb0c0a216bf477cad6cabcd3fab16fd44ec534209d44994e3d6fae5ee7c388c6927db

    • SSDEEP

      49152:GpUPLCQMukBtM5X1nMg1YkStdn6MfBDShK10/doJMzSoj1wPMkncgBWfQ8bpCrbU:GpAczg71YkDMfYhpFEMzHYMqcYWJbUrY

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks