General

  • Target

    document_reader.exe

  • Size

    3.9MB

  • Sample

    240206-qj3aesfhb3

  • MD5

    dd191e98e5c264b5078b13fe38566d7e

  • SHA1

    5b8b2c15c9457bfd0ce9ed012c308f245ee6d92d

  • SHA256

    9a3990e375cc3a3a9d6c659b5b5551900dcdc1e7fc8f807f85a951517c8ae96f

  • SHA512

    72ee9f8fbab5beb5559c993941b1ec03e26ef6f8add89c89206e0283ea141cfa301cbb382fcac2bc4f6b2c9e88f64037f75dbb23f4477508848b8ef25be31289

  • SSDEEP

    49152:zLaXnHEdxX+e3FLpgvDn8P7SM4af+QZ2asV:zLIIhGh

Malware Config

Targets

    • Target

      document_reader.exe

    • Size

      3.9MB

    • MD5

      dd191e98e5c264b5078b13fe38566d7e

    • SHA1

      5b8b2c15c9457bfd0ce9ed012c308f245ee6d92d

    • SHA256

      9a3990e375cc3a3a9d6c659b5b5551900dcdc1e7fc8f807f85a951517c8ae96f

    • SHA512

      72ee9f8fbab5beb5559c993941b1ec03e26ef6f8add89c89206e0283ea141cfa301cbb382fcac2bc4f6b2c9e88f64037f75dbb23f4477508848b8ef25be31289

    • SSDEEP

      49152:zLaXnHEdxX+e3FLpgvDn8P7SM4af+QZ2asV:zLIIhGh

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks