General

  • Target

    63504a7e967d5983fd36d4b4c96284332104758a19dbc9c7a0ff4225d6f8ff13.zip

  • Size

    2.4MB

  • Sample

    240302-xx69vsgg43

  • MD5

    2cabe6c1f9065189806e361fe503e572

  • SHA1

    87b1d72e39951c49aab0aed00d7664d969399684

  • SHA256

    6155bc23b47bf621a4723c6226816365eb922fb984fe1616495f4e0bbbe5806c

  • SHA512

    b47f4083b21ba8861121b317102528cf5f8de49e1f25aa638f65c02edcccc5232cb0479ac9cb0fa370f411841118a51db705b0a72e89b599abad095dda4e7861

  • SSDEEP

    49152:DXn1N8/Eku39vPz9onTWYW3Jb11PCBpAjfPJRPhTm6fZP69youDcp9BzQE:DXn1N8/qPinTWxJxobSPJ1hHfi99p1

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

prodomainnameeforappru.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    WeBiMyRU

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      build-x64.msi

    • Size

      5.8MB

    • MD5

      2999391319cda1be5dacfaf5b05062b2

    • SHA1

      c983b7dff2ea4c63f3944e639eb54d0e6b0b655f

    • SHA256

      3bf99810510c197b9cd6e434d95417515dbc42f94b11bbf9916ec160066eb77e

    • SHA512

      1b9a7e5211979f37097c28122cbe99b5ec81ca3caa07944ddaba1afb2515ef3545f92bce35efa87914221016867f88b9b64c7a6a07e8e3f0cb556182047c7f27

    • SSDEEP

      49152:NpUPFUhtSTK+0THkWsN8SDYdvH5eoQDWeEHHhRgWEF9nuriG7DrFWoRRRJuGgagL:NpMnFDcEWoVoFWRGga5q

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks