General

  • Target

    e7019ee941b030e2c7e900bbfc11a0145bb929f02a73d62a419086b800cdce9c.zip

  • Size

    8.6MB

  • Sample

    231119-zjvd9abd79

  • MD5

    85b6038e04ca578c9e7c2825d12cd289

  • SHA1

    eb8741a7a31bf6df7b4bfc8a5f5284224c4e78df

  • SHA256

    adcbb74a6e3a3b92324d450df007b02bc9293f35f485cd18a5b7a660610c4334

  • SHA512

    d4e9e05e31d2f973260a3452025ad3800e9e3dee9c3af0438370bb1390deaa941378e6d10dd72d9b3bbe610752e46a30bec2c803984355acc0f4b2f8bde95c5d

  • SSDEEP

    196608:fPjJ8fBBAlZS+RWJmWpvhqUWVBvTlpNkGPkiQEeI:fLJ8fGSpJhlhPGxBPbx

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://adhufdauifadhj13.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    stanpttaHMuhnz

  • internal_mutex

    txtMut

  • minimum_disk

    40

  • minimum_ram

    6002

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      e91874c5d8c2.msi

    • Size

      8.7MB

    • MD5

      1170e2b02b92895d9db0be336d032d90

    • SHA1

      18f49619d69b057e81163bdf08eab5f355ce662c

    • SHA256

      8b6c6c007efa8e1a7da241564142f8a8a934dcce451c7e522cdd86292e81ead7

    • SHA512

      bd1ceeee7928592e318b7f28b557bfcb97e4bb8f65f8c09001f19a746c7532f4f9d86aa54aab2866b5852921aa04a4f8de18e6c9109cc91c94c34879013c0134

    • SSDEEP

      196608:YeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9cNzvhXoZJ+:YdhVs6WXjX9HZ5AQX32WD/oZY

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks