General

  • Target

    08112023_2347_drkgate_fsg.bin

  • Size

    405KB

  • Sample

    231108-s8cr6sce6y

  • MD5

    1aa04a5bfb041fe8e136ec0bd5c92e33

  • SHA1

    cfa32f6bdf7a64869a5166935ad8d027d4d90b4d

  • SHA256

    22347a3c12046ab10f8d0e087d0ae71338581b9e0e146b01da281a226c47268a

  • SHA512

    c0b3e27afd239cddf88e309e4f9733501cb3ddf09e11e7cf55a698e31c5dab5dc6723b2ef46906687187b28e6211e176a04afaca58887134efad7aada91298ab

  • SSDEEP

    6144:+5UHKhp9UQpT0E3OWRytzcUE/GLRqpBwPfoCc4S3XuivrjkXRJfa:oUHKJ0E3OWRytCi6BwPyTnuivvkXR

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

PLEX

C2

http://homeservicetreking.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    8443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    tJAEBsRlHobUrN

  • internal_mutex

    txtMut

  • minimum_disk

    18

  • minimum_ram

    6009

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    PLEX

Targets

    • Target

      08112023_2347_drkgate_fsg.bin

    • Size

      405KB

    • MD5

      1aa04a5bfb041fe8e136ec0bd5c92e33

    • SHA1

      cfa32f6bdf7a64869a5166935ad8d027d4d90b4d

    • SHA256

      22347a3c12046ab10f8d0e087d0ae71338581b9e0e146b01da281a226c47268a

    • SHA512

      c0b3e27afd239cddf88e309e4f9733501cb3ddf09e11e7cf55a698e31c5dab5dc6723b2ef46906687187b28e6211e176a04afaca58887134efad7aada91298ab

    • SSDEEP

      6144:+5UHKhp9UQpT0E3OWRytzcUE/GLRqpBwPfoCc4S3XuivrjkXRJfa:oUHKJ0E3OWRytCi6BwPyTnuivvkXR

    Score
    10/10

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks