General

  • Target

    08112023_2347_drkgate_fsg.bin

  • Size

    405KB

  • MD5

    1aa04a5bfb041fe8e136ec0bd5c92e33

  • SHA1

    cfa32f6bdf7a64869a5166935ad8d027d4d90b4d

  • SHA256

    22347a3c12046ab10f8d0e087d0ae71338581b9e0e146b01da281a226c47268a

  • SHA512

    c0b3e27afd239cddf88e309e4f9733501cb3ddf09e11e7cf55a698e31c5dab5dc6723b2ef46906687187b28e6211e176a04afaca58887134efad7aada91298ab

  • SSDEEP

    6144:+5UHKhp9UQpT0E3OWRytzcUE/GLRqpBwPfoCc4S3XuivrjkXRJfa:oUHKJ0E3OWRytCi6BwPyTnuivvkXR

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

PLEX

C2

http://homeservicetreking.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    8443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    tJAEBsRlHobUrN

  • internal_mutex

    txtMut

  • minimum_disk

    18

  • minimum_ram

    6009

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    PLEX

Signatures

  • Darkgate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 08112023_2347_drkgate_fsg.bin
    .exe windows:4 windows x86

    Password: infected


    Headers

    Sections