General

  • Target

    fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.zip

  • Size

    2.2MB

  • Sample

    240302-xx84fsgc5t

  • MD5

    d9e0d94a55b67ebf04f9bbe43501dc3c

  • SHA1

    2f5b9dcd47c142a1a637797db765063f23ad69a7

  • SHA256

    c91c370b2295950cf025299aafced7f60db77e9379461d0080bf768182084f7b

  • SHA512

    4e4efcc493e2f355e2b29e634eeec7c6579da4454457d0d740e9fd15cdeabe1df86d4c3f8812043fbd3b7cdcea46f87057224dc59de905303a7f98343e0de0bb

  • SSDEEP

    49152:0OqFDSkdU4zIssI6EKhPzbcEhCtjdnOwbDBd/GApC9H:8Ske4zILI6hfdEdOSdQ9H

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

stachmentsuprimeresult.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    veVumtze

  • minimum_disk

    30

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi

    • Size

      4.3MB

    • MD5

      b88352bde539f79207be209759505f02

    • SHA1

      8ede7ee0a43c4282b41687408ddc38a243ac4bfd

    • SHA256

      fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112

    • SHA512

      104d4330c05e41d2039a0b61438565c88138ec9b2c55632ab0ec8eaf70840b095e1dd5bb5d55b65373099df80896632499ff5b3c85240d7a389824cb72268921

    • SSDEEP

      49152:zpUPB9qhCxzT+WKjSX15zLVI4vLeY9xV4qtGvmKBteU5oBgffUBS88qAU8:zpECQ1FLeYLVTV4WMVf

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks