General

  • Target

    21112023_0058_leaf_drkgate.bin

  • Size

    405KB

  • Sample

    231120-vg8fwahc22

  • MD5

    16fa94fee40b0cf3b8f295c4b0f79a5f

  • SHA1

    ada58a52f52d59514dded5c9ee8fd776e668247e

  • SHA256

    c8711d9c9c0ea4201bd28cc83da804b193fe9b87ff9bd55be3e7ed13b675b2d4

  • SHA512

    2dfb36d0118ed796172ed80885553c7a20e02c6b22429f8e052f1351334cdca6b26aa5d921929157024d6cf0e240205fd0217286b0d0298ee0c96e77f8f7680e

  • SSDEEP

    6144:m5UHKhp9UQpT0E3OWRytzcUE/Gm1GML4xVHbzKlogClfwkJKbbY:QUHKJ0E3OWRytCn3L4xJbmlogClokJL

Malware Config

Extracted

Family

darkgate

Botnet

rockyoudragon

C2

http://188.246.224.221

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    jHsOoiOBxlimUu

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    rockyoudragon

Targets

    • Target

      21112023_0058_leaf_drkgate.bin

    • Size

      405KB

    • MD5

      16fa94fee40b0cf3b8f295c4b0f79a5f

    • SHA1

      ada58a52f52d59514dded5c9ee8fd776e668247e

    • SHA256

      c8711d9c9c0ea4201bd28cc83da804b193fe9b87ff9bd55be3e7ed13b675b2d4

    • SHA512

      2dfb36d0118ed796172ed80885553c7a20e02c6b22429f8e052f1351334cdca6b26aa5d921929157024d6cf0e240205fd0217286b0d0298ee0c96e77f8f7680e

    • SSDEEP

      6144:m5UHKhp9UQpT0E3OWRytzcUE/Gm1GML4xVHbzKlogClfwkJKbbY:QUHKJ0E3OWRytCn3L4xJbmlogClokJL

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

MITRE ATT&CK Enterprise v15

Tasks