General

  • Target

    gentle.js

  • Size

    135KB

  • Sample

    231101-z6cgysfa38

  • MD5

    ffa38ff8c434945de11b621958170a10

  • SHA1

    6429a10526d4224e5a9d5e4ab9f71cfa3a1bd460

  • SHA256

    4dce8991fb2942cb8443aba697311072aa25fc61b4b4186a54e7956c2bec6799

  • SHA512

    f4f5fcde08d4ab8d167071ba9eed55cb4d575251da66fcd8005a85970f26e07be31a6f65a42ff47ee238e498f66fef625c97eabe0c87eee3f18ae1d3f98d022a

  • SSDEEP

    1536:BZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/0c:0T9U7hgaX6eerjqlI2IO6Mzqfpu

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://shsukadadyuikmmonk.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    WccksaEfoXLLtV

  • internal_mutex

    txtMut

  • minimum_disk

    50

  • minimum_ram

    6001

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      gentle.js

    • Size

      135KB

    • MD5

      ffa38ff8c434945de11b621958170a10

    • SHA1

      6429a10526d4224e5a9d5e4ab9f71cfa3a1bd460

    • SHA256

      4dce8991fb2942cb8443aba697311072aa25fc61b4b4186a54e7956c2bec6799

    • SHA512

      f4f5fcde08d4ab8d167071ba9eed55cb4d575251da66fcd8005a85970f26e07be31a6f65a42ff47ee238e498f66fef625c97eabe0c87eee3f18ae1d3f98d022a

    • SSDEEP

      1536:BZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/0c:0T9U7hgaX6eerjqlI2IO6Mzqfpu

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks