General

  • Target

    start-update(repair).msi

  • Size

    8.6MB

  • Sample

    231027-he5kzscf8z

  • MD5

    082c83b92f29817d2ebc366935f90a45

  • SHA1

    15550445a12440fb21206aff6878d6d3ac029e8f

  • SHA256

    b2da2a7e096b70ea8c3fb755389ba54288a3ba73f823297f96eac2626e13c519

  • SHA512

    ffb8b072edc8bcbca1466ba4f232a0fe6009e080abad0a2b10d5c7dc26e5089c0f49e68a0a6ba1345e840e05d83e99dac2a98b1e20ff92a9318b00af64c4df04

  • SSDEEP

    196608:fkdAirk9zqV8GinTPMoGkd/ROfL0uUmN4in1VAnEVYxVSe32FO7Oxuh/:sdAirAzqVAnTPMgd+0ogHnF35Oxe/

Malware Config

Extracted

Family

darkgate

Botnet

ADS5

C2

http://sftp.noheroway.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    nblvjKzeozPOUG

  • internal_mutex

    txtMut

  • minimum_disk

    40

  • minimum_ram

    7000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ADS5

Targets

    • Target

      start-update(repair).msi

    • Size

      8.6MB

    • MD5

      082c83b92f29817d2ebc366935f90a45

    • SHA1

      15550445a12440fb21206aff6878d6d3ac029e8f

    • SHA256

      b2da2a7e096b70ea8c3fb755389ba54288a3ba73f823297f96eac2626e13c519

    • SHA512

      ffb8b072edc8bcbca1466ba4f232a0fe6009e080abad0a2b10d5c7dc26e5089c0f49e68a0a6ba1345e840e05d83e99dac2a98b1e20ff92a9318b00af64c4df04

    • SSDEEP

      196608:fkdAirk9zqV8GinTPMoGkd/ROfL0uUmN4in1VAnEVYxVSe32FO7Oxuh/:sdAirAzqVAnTPMgd+0ogHnF35Oxe/

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks