General

  • Target

    6be88c44036a6b48e179d8ad2b8f2c049a1fb196b4174716318ae4f94f9a77d4.zip

  • Size

    2.4MB

  • Sample

    240302-xx7wdsgg44

  • MD5

    e7300ff64ecb00fa5a34bac739f65807

  • SHA1

    8e09242468c8894ffcc55e4f2e45a1892ca33deb

  • SHA256

    a8b1e929fb25a401b6c0e74bf443046bfc6142561d0cf7328995fad5db62331f

  • SHA512

    3125b6366aa9fbd9076c48ad5336382f1d943c6fb4248c994ba7a397a54f6223bc16bd8e62f0d71c3b3c88a9f55bbae42748a447cd572541ab47ddfde99d2f09

  • SSDEEP

    49152:JlfxIpNJU5wPF12gA6yDkFbjFCMu0PCkzf34XGV2Y1fOupz6XQzNggKnql:J9gZnFCMu0PCkzU6F1fOupOs

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

prodomainnameeforappru.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    true

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    VzXLKSZE

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      build-x64.msi

    • Size

      5.8MB

    • MD5

      9c02a9298b97fcfc5a75fbedf08002bd

    • SHA1

      2d3bc2856c015914f2856331a0315298f3c34b0c

    • SHA256

      693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a

    • SHA512

      fafe5dddb610068cb1044c803a6d681d1739904d8e0c4b2b0fc05bcd55cf9344f69e77c8627ae73713f759117d81a78855ff937ee8650b47ab18d37cb9ca34bc

    • SSDEEP

      49152:ppUP3UhtSTK+0THkWsN8SDYdvH5eoQDWhbHHhZgWEF94FJy5jvrgFdbBUleY82cp:pp6nFDkEWoyvy5jvcdbBUkYC+XCFmpC

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks