General

  • Target

    document_reader - Copy.exe

  • Size

    3.9MB

  • Sample

    240206-qj13cshfdq

  • MD5

    0b3862697827944cc338f06ba9105afa

  • SHA1

    c4b09f47e7942f487986622e61643c347311436a

  • SHA256

    964fa0512b4b0bcc0e5c134ca5338afeb6122fb47df3142d2147d84772027837

  • SHA512

    6b1d4ececa6d88166ed538958ecc85731100600468484e4f52e826e0e7a2733dbb1eccaedc7ae66902fbd2cdf7acae2ee70d2cc65c745ed39d8ecf687f599224

  • SSDEEP

    49152:xsoCGLD9MP+a3FLiyDxn8P7Sfcaf+eHMms:xsrBVV

Malware Config

Extracted

Family

darkgate

Botnet

xiputin2

C2

bizabiza.mywire.org

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    8094

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    OvQSCXBO

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    xiputin2

Extracted

Family

darkgate

Version

6.1.7

Botnet

xiputin2

C2

bizabiza.mywire.org

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    8094

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    OvQSCXBO

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    xiputin2

Targets

    • Target

      document_reader - Copy.exe

    • Size

      3.9MB

    • MD5

      0b3862697827944cc338f06ba9105afa

    • SHA1

      c4b09f47e7942f487986622e61643c347311436a

    • SHA256

      964fa0512b4b0bcc0e5c134ca5338afeb6122fb47df3142d2147d84772027837

    • SHA512

      6b1d4ececa6d88166ed538958ecc85731100600468484e4f52e826e0e7a2733dbb1eccaedc7ae66902fbd2cdf7acae2ee70d2cc65c745ed39d8ecf687f599224

    • SSDEEP

      49152:xsoCGLD9MP+a3FLiyDxn8P7Sfcaf+eHMms:xsrBVV

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Darkgate family

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks