General

  • Target

    27022024_2353_scan.msi

  • Size

    5.7MB

  • Sample

    240227-tb4p3add8v

  • MD5

    50c85e84f91c3b7f1811380aeae9d606

  • SHA1

    7703c4ec1ea28c2b9785eb02b5c11b7b226155eb

  • SHA256

    ef989e3924e2f9e3fe7ec53fd870124b8f9174275428c36e03a991a55ce5ad54

  • SHA512

    e5b2930d2c44d27af969f96b2040045b6a9a6d6ad6cd500a3b01b7b789e713f8bd6dc867a7d6bfc39b87004bfb67744899cb5e94e37bef142aa2f0e21fe7d02c

  • SSDEEP

    49152:opUPXXhs0/Te0LjgIAkr5VbSPn9VISBdxXhYHGphbEEoGVupQMKk+/GTeonv3c9M:opEpoVR0mVERDCjk+Onva46G

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

remasterprodelherskjs.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    kiQRLFmc

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      27022024_2353_scan.msi

    • Size

      5.7MB

    • MD5

      50c85e84f91c3b7f1811380aeae9d606

    • SHA1

      7703c4ec1ea28c2b9785eb02b5c11b7b226155eb

    • SHA256

      ef989e3924e2f9e3fe7ec53fd870124b8f9174275428c36e03a991a55ce5ad54

    • SHA512

      e5b2930d2c44d27af969f96b2040045b6a9a6d6ad6cd500a3b01b7b789e713f8bd6dc867a7d6bfc39b87004bfb67744899cb5e94e37bef142aa2f0e21fe7d02c

    • SSDEEP

      49152:opUPXXhs0/Te0LjgIAkr5VbSPn9VISBdxXhYHGphbEEoGVupQMKk+/GTeonv3c9M:opEpoVR0mVERDCjk+Onva46G

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Modifies file permissions

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks