General

  • Target

    document_reader - Copy.exe

  • Size

    3.9MB

  • Sample

    240206-px2elshbhk

  • MD5

    0b3862697827944cc338f06ba9105afa

  • SHA1

    c4b09f47e7942f487986622e61643c347311436a

  • SHA256

    964fa0512b4b0bcc0e5c134ca5338afeb6122fb47df3142d2147d84772027837

  • SHA512

    6b1d4ececa6d88166ed538958ecc85731100600468484e4f52e826e0e7a2733dbb1eccaedc7ae66902fbd2cdf7acae2ee70d2cc65c745ed39d8ecf687f599224

  • SSDEEP

    49152:xsoCGLD9MP+a3FLiyDxn8P7Sfcaf+eHMms:xsrBVV

Malware Config

Targets

    • Target

      document_reader - Copy.exe

    • Size

      3.9MB

    • MD5

      0b3862697827944cc338f06ba9105afa

    • SHA1

      c4b09f47e7942f487986622e61643c347311436a

    • SHA256

      964fa0512b4b0bcc0e5c134ca5338afeb6122fb47df3142d2147d84772027837

    • SHA512

      6b1d4ececa6d88166ed538958ecc85731100600468484e4f52e826e0e7a2733dbb1eccaedc7ae66902fbd2cdf7acae2ee70d2cc65c745ed39d8ecf687f599224

    • SSDEEP

      49152:xsoCGLD9MP+a3FLiyDxn8P7Sfcaf+eHMms:xsrBVV

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks