General

  • Target

    New Compressed (zipped) Folder.zip

  • Size

    11.0MB

  • Sample

    231117-y12dfseg9t

  • MD5

    a067a3aa337b4f10be8b4d14fab19798

  • SHA1

    c0e62ed4b9506c02154e8706fca58d0c8954dd2f

  • SHA256

    9e8edbacb53fe27d3723151ab2d6ed203473edf666caebfab7dbf442bd68d463

  • SHA512

    d7a3a2f290beb39169ea68c9f074f6abf21946cca44a8041d9943a19cd906d13e833655ed043d9eab544484ea48ddeb470b2a78bcd61d649ae859fc8d4d34dff

  • SSDEEP

    196608:Zqo3ZAvK5TzNAtqH8srUVfhGAigGGG3lnYZ+tjxUpVQmv3WoQ/8sdOYbBfTKvj9U:lqvhtrWUe1gFG3KZoWvvYQkBfTKvj9U

Malware Config

Extracted

Family

darkgate

Botnet

A11111

C2

http://faststroygo.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    sYEvPOjQglaHah

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    A11111

Targets

    • Target

      New Compressed (zipped) Folder.zip

    • Size

      11.0MB

    • MD5

      a067a3aa337b4f10be8b4d14fab19798

    • SHA1

      c0e62ed4b9506c02154e8706fca58d0c8954dd2f

    • SHA256

      9e8edbacb53fe27d3723151ab2d6ed203473edf666caebfab7dbf442bd68d463

    • SHA512

      d7a3a2f290beb39169ea68c9f074f6abf21946cca44a8041d9943a19cd906d13e833655ed043d9eab544484ea48ddeb470b2a78bcd61d649ae859fc8d4d34dff

    • SSDEEP

      196608:Zqo3ZAvK5TzNAtqH8srUVfhGAigGGG3lnYZ+tjxUpVQmv3WoQ/8sdOYbBfTKvj9U:lqvhtrWUe1gFG3KZoWvvYQkBfTKvj9U

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

4
T1082

Tasks