General

  • Target

    69f900118f985990f488121cd1cf5e2b.bin

  • Size

    9.0MB

  • Sample

    231025-b4hdesdg6z

  • MD5

    907ef2e6272e61bcc1141425490a5087

  • SHA1

    9d8dbe27fd59fb191b840a0c6a63adf012638180

  • SHA256

    ceb8b96227f3fffeba164d7ace94391ec670e9187695b03ad7641c45349177cc

  • SHA512

    bd7a4d6ddd85c83bfdf6bb4c3256f13f639a151f868b2e116e933a00ceaa6adf82f5e17548ea4aaac7d8a3a82b038ec99067f25a67b29228515c8f8675e69ffb

  • SSDEEP

    196608:I5tPR29Y8S55E0++g6SrQadzVs0pS3WVOwZYEH:I3J2q8Q51JozWgSGVOZEH

Malware Config

Extracted

Family

darkgate

Botnet

civilian1337

C2

http://185.130.227.202

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    VPsTDMdPtonzYs

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    civilian1337

Targets

    • Target

      1fb6b8bed3a67ee4225f852c3d90fd2b629f2541ab431b4bd4d9d9f5bbd2c4b7.msi

    • Size

      9.2MB

    • MD5

      69f900118f985990f488121cd1cf5e2b

    • SHA1

      33f6b7aac2afaba74eeac1a44ba9ec5d0a53d00c

    • SHA256

      1fb6b8bed3a67ee4225f852c3d90fd2b629f2541ab431b4bd4d9d9f5bbd2c4b7

    • SHA512

      09ae36c29bfbb09ed1fdc3da5ed365fa61cf2905e177909b6a8fcef8e0a25742d1acffdb13378b91c3fa607ecece4de39b380894b6df9152f06350972bbfaa42

    • SSDEEP

      196608:zhbWzPMCeNrs0rczeuNr/QnMOsaB9QVuHSzdUupBqbHSDjs6cv1HDQfgaP:FbWzPM5HCZNrgMVw6wyZUupkjSPcv1jO

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks