General

  • Target

    1c532f2594.msi

  • Size

    8.5MB

  • Sample

    231109-tjg62aac8t

  • MD5

    fbf5d7b4c5f0e86a95b4fcd5c5ccc534

  • SHA1

    51588315ff4ae36412c337361ea65f84810938d8

  • SHA256

    6da198925581418863170f05b832cd1584b923278d0730d779a30ec96513111d

  • SHA512

    3ef2d34071fc10bed59dbe60df3789524f62b89284cc011f1ab0a790196f9010ef6fa41d809947f52668918aa72c90c17211d6be82707b0f8099df548fb40588

  • SSDEEP

    196608:0eS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9OtaQCK0Ex7FVJi0:0dhVs6WXjX9HZ5AQX32WDb0ExZV8

Malware Config

Extracted

Family

darkgate

Botnet

PLEX

C2

http://jordanmikejeforse.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    8443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    yIzFYincIffips

  • internal_mutex

    txtMut

  • minimum_disk

    20

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    PLEX

Targets

    • Target

      1c532f2594.msi

    • Size

      8.5MB

    • MD5

      fbf5d7b4c5f0e86a95b4fcd5c5ccc534

    • SHA1

      51588315ff4ae36412c337361ea65f84810938d8

    • SHA256

      6da198925581418863170f05b832cd1584b923278d0730d779a30ec96513111d

    • SHA512

      3ef2d34071fc10bed59dbe60df3789524f62b89284cc011f1ab0a790196f9010ef6fa41d809947f52668918aa72c90c17211d6be82707b0f8099df548fb40588

    • SSDEEP

      196608:0eS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9OtaQCK0Ex7FVJi0:0dhVs6WXjX9HZ5AQX32WDb0ExZV8

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks