General

  • Target

    NEAS.567d828dab1022eda84f90592d6d95e331e0f2696e79ed7d86ddc095bb2efdc8msi_JC.unknown

  • Size

    9.1MB

  • Sample

    231024-ypaflagg35

  • MD5

    f90e30df61aec134fba71d66a87326c1

  • SHA1

    593efb526ecc12d7020c35645cce6ad3a1774e6a

  • SHA256

    567d828dab1022eda84f90592d6d95e331e0f2696e79ed7d86ddc095bb2efdc8

  • SHA512

    cf377981323a1f87e421b3c4f42a4df9ddff7ba72ad0a0a7ad77e1835a68d748437252a83328a9503dec2208d63d0a9e56ee2ad2ff340a97b11377fb5a41648c

  • SSDEEP

    196608:BhbWzPMCeNrs0rczeuNr/QnMOsaB9QVuHSzdUupBqbHSDjs6cvUOzZx:XbWzPM5HCZNrgMVw6wyZUupkjSPcvXx

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://voodmastrelinux.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    vBojMjKiOxwdob

  • internal_mutex

    txtMut

  • minimum_disk

    35

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      NEAS.567d828dab1022eda84f90592d6d95e331e0f2696e79ed7d86ddc095bb2efdc8msi_JC.unknown

    • Size

      9.1MB

    • MD5

      f90e30df61aec134fba71d66a87326c1

    • SHA1

      593efb526ecc12d7020c35645cce6ad3a1774e6a

    • SHA256

      567d828dab1022eda84f90592d6d95e331e0f2696e79ed7d86ddc095bb2efdc8

    • SHA512

      cf377981323a1f87e421b3c4f42a4df9ddff7ba72ad0a0a7ad77e1835a68d748437252a83328a9503dec2208d63d0a9e56ee2ad2ff340a97b11377fb5a41648c

    • SSDEEP

      196608:BhbWzPMCeNrs0rczeuNr/QnMOsaB9QVuHSzdUupBqbHSDjs6cvUOzZx:XbWzPM5HCZNrgMVw6wyZUupkjSPcvXx

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks