General

  • Target

    juhygr.msi

  • Size

    8.3MB

  • Sample

    231101-zrkvsadb21

  • MD5

    2a2cfd61d4ebc2f4956e9a56815b7c0f

  • SHA1

    47718e8df5e7a0d0b2c74f10696ca50cf6e1e0b9

  • SHA256

    3a67f1634416de1483327e8cfe38c456f6891512433f5128df07444e44b886cd

  • SHA512

    96989896a5eb3dc99d602cad4bfa4ced65ac04a1fd5e79c8c09a70e3a5ce6bcd8eb686ab96f55191a2e5712c23f543ac5f29ab11e773238c27c76905cd4cdb22

  • SSDEEP

    196608:ikdAirk9zqV8GinTPMoGkd/ROfL0uUmN4in1VAnEVYxVSe317I:pdAirAzqVAnTPMgd+0ogHnF317I

Malware Config

Extracted

Family

darkgate

Botnet

ADS5

C2

http://sftp.noheroway.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    ATXtlWVDuHaLOk

  • internal_mutex

    txtMut

  • minimum_disk

    40

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ADS5

Targets

    • Target

      juhygr.msi

    • Size

      8.3MB

    • MD5

      2a2cfd61d4ebc2f4956e9a56815b7c0f

    • SHA1

      47718e8df5e7a0d0b2c74f10696ca50cf6e1e0b9

    • SHA256

      3a67f1634416de1483327e8cfe38c456f6891512433f5128df07444e44b886cd

    • SHA512

      96989896a5eb3dc99d602cad4bfa4ced65ac04a1fd5e79c8c09a70e3a5ce6bcd8eb686ab96f55191a2e5712c23f543ac5f29ab11e773238c27c76905cd4cdb22

    • SSDEEP

      196608:ikdAirk9zqV8GinTPMoGkd/ROfL0uUmN4in1VAnEVYxVSe317I:pdAirAzqVAnTPMgd+0ogHnF317I

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks