General

  • Target

    8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7.zip

  • Size

    8.6MB

  • Sample

    231119-z3mhrabf43

  • MD5

    baff4c8e01f240b774081fbad2b06e9d

  • SHA1

    cf2fd78be584635c15fc36f96457ae78a5ab8b7c

  • SHA256

    9fbc0396a2da0e9097e0ba9b18d52b57984903fd19106b3923ee26da761419fb

  • SHA512

    d80a11c490713bf8552aaaa4c6b79787a3176d112e5e393276910030ea19948794c7c6f56c91a9d80b1aace2b7582ec3865753df76044b09b57b4061a97605eb

  • SSDEEP

    196608:k+EkA4OGG1zdOcP3l0S4dDKAwmxt6gcIKvYnk:uf0Odnt0S4dKAXxtXKvp

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://adhufdauifadhj13.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    stanpttaHMuhnz

  • internal_mutex

    txtMut

  • minimum_disk

    40

  • minimum_ram

    6002

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7.msi

    • Size

      8.7MB

    • MD5

      1170e2b02b92895d9db0be336d032d90

    • SHA1

      18f49619d69b057e81163bdf08eab5f355ce662c

    • SHA256

      8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7

    • SHA512

      bd1ceeee7928592e318b7f28b557bfcb97e4bb8f65f8c09001f19a746c7532f4f9d86aa54aab2866b5852921aa04a4f8de18e6c9109cc91c94c34879013c0134

    • SSDEEP

      196608:YeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9cNzvhXoZJ+:YdhVs6WXjX9HZ5AQX32WD/oZY

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks