General

  • Target

    8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7.zip

  • Size

    8.6MB

  • Sample

    231119-3hgzbacf46

  • MD5

    e386765c1d62d445858448ef20f747ac

  • SHA1

    a5663ce2492a5216908cc06887de5c8434ce77fe

  • SHA256

    c449f2a95a78d691fe08448884a8301925b19d78ae8644379d81cc9103bf8dc9

  • SHA512

    ba0b3a6b65cb315ec75ba232058fb98b8e7c70c14d3302b101e30edb297e259869558cfa9a7167bc30fdbe14f9e889400845f54fc43e6400db196d230bba093a

  • SSDEEP

    196608:iFH5PPnFcqGcO8CrMltPRr7+GWSYg1S9hs6F7DpAccGhk:id5nnFcrc/42r7k41ah5Yh

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://adhufdauifadhj13.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    stanpttaHMuhnz

  • internal_mutex

    txtMut

  • minimum_disk

    40

  • minimum_ram

    6002

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7.msi

    • Size

      8.7MB

    • MD5

      1170e2b02b92895d9db0be336d032d90

    • SHA1

      18f49619d69b057e81163bdf08eab5f355ce662c

    • SHA256

      8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7

    • SHA512

      bd1ceeee7928592e318b7f28b557bfcb97e4bb8f65f8c09001f19a746c7532f4f9d86aa54aab2866b5852921aa04a4f8de18e6c9109cc91c94c34879013c0134

    • SSDEEP

      196608:YeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9cNzvhXoZJ+:YdhVs6WXjX9HZ5AQX32WD/oZY

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks