General

  • Target

    e7fb7aa7dc05e76b1c8054a9a375158f.bin

  • Size

    1.9MB

  • Sample

    240202-cb3pbsdebk

  • MD5

    ce5b90b6177442eb8669f5f9cca01798

  • SHA1

    559ae3c1ffacc211dfdfe9df1daaea606631e59a

  • SHA256

    14ca3dc03e22d3794c7f7c133426128ad4f4fdcc907febcf3954e53b1acb1e9f

  • SHA512

    7754752b8dec88ce47bba02c2416e735d248a3b88ed3957dc2773cf98ea42ebe48764d206f02fc0002c904892d25858aceab5d108ed313b4ab5dfdff8e64c956

  • SSDEEP

    49152:VqbGluCvOFwxdDPqfUy9rM0K9VGN4y9ABvJPky38uaQPg:+rOHH2rrjK9YCUSvJsysutPg

Malware Config

Targets

    • Target

      mkreafr.msi

    • Size

      4.3MB

    • MD5

      4f238c2093606fc296f1f819c2f0fc67

    • SHA1

      f8535858fcee6b96e0f49e6156fa110fc0698880

    • SHA256

      58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994

    • SHA512

      c2422db8871d6303b5903c4b11cca3debd62cb25a406655db5a0ba407f33c9fef739371d297e5ccad45efc99e040e6ae29079b4b9325f52d54c5e780f8c346f7

    • SSDEEP

      49152:jpUPN9qhCxzT+WKjSXcmNt6+XzP4BYIeBfCXqyfdo1DDDDDDDDDDPuDgO9hTnxA5:jpqCQbm+jg12f3yaiga6yU

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Modifies file permissions

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks