General

  • Target

    6da198925581418863170f05b832cd1584b923278d0730d779a30ec96513111d.zip

  • Size

    8.4MB

  • Sample

    231119-1day4abh35

  • MD5

    4dfefc14cd129975463353f1ecf9a39b

  • SHA1

    21681414e6f3a60ee433c234a48f4d0f943d056a

  • SHA256

    f294fb7a82f26aa1653beb4d4ac50c72fab681373d8642e4313a16d4dc8d0d02

  • SHA512

    758e18920aa1edd9c02fcac0abd662ca7768c6aaacb44fe7581f0a0f91017e84569f27ad302a6a1441b9ce856ab5fac2aa9b013b5eb62e34628115e2eee91648

  • SSDEEP

    196608:XShI+7maR4MC0fZRVGx7eeFDTV8RH1UdJBIJVfFzdD0yUG:ihI+7maCv0BGx7ee1Z8Z1Un+fFzl9

Malware Config

Extracted

Family

darkgate

Botnet

PLEX

C2

http://jordanmikejeforse.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    8443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    yIzFYincIffips

  • internal_mutex

    txtMut

  • minimum_disk

    20

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    PLEX

Targets

    • Target

      6da198925581418863170f05b832cd1584b923278d0730d779a30ec96513111d.msi

    • Size

      8.5MB

    • MD5

      fbf5d7b4c5f0e86a95b4fcd5c5ccc534

    • SHA1

      51588315ff4ae36412c337361ea65f84810938d8

    • SHA256

      6da198925581418863170f05b832cd1584b923278d0730d779a30ec96513111d

    • SHA512

      3ef2d34071fc10bed59dbe60df3789524f62b89284cc011f1ab0a790196f9010ef6fa41d809947f52668918aa72c90c17211d6be82707b0f8099df548fb40588

    • SSDEEP

      196608:0eS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9OtaQCK0Ex7FVJi0:0dhVs6WXjX9HZ5AQX32WDb0ExZV8

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks