General

  • Target

    de69281050c18627c8e75a3f4cdf933db77ace2a8dd13ef753f61ad6e0a405ad.zip

  • Size

    1.6MB

  • Sample

    240302-xx8spagg47

  • MD5

    8a178ceca36f62352f67490fdf1cf5bb

  • SHA1

    136a41b6f4a77ea556286c98232284bfb04e5bd6

  • SHA256

    cb6631977fd57aea2c49e62263131b3e20a071495ad63adb3363ca6fd0d3184a

  • SHA512

    d4d8eb8df06d6955b3df88d526a619c0a53487c9ee686d1fd05e1aa78ea12b641be0ddb7a86ad160f6f1de57607aeeea6725245325fa54f90d4c4096a9f738e8

  • SSDEEP

    49152:TavR6D8yFNImN7oTij6BgtYWEqcrtl/bb+XzY6QtStAZGkzq:mpg8kI07o+j6abEp/eVcB0

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

pjnbadfjandkadm3kd.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    wVImrJRl

  • minimum_disk

    100

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Extracted

Family

darkgate

Version

6.1.7

Botnet

admin888

C2

pjnbadfjandkadm3kd.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    wVImrJRl

  • minimum_disk

    100

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      de69281050c18627c8e75a3f4cdf933db77ace2a8dd13ef753f61ad6e0a405ad.msi

    • Size

      3.2MB

    • MD5

      6922c8d97e6d60135a3c55302ce1eecf

    • SHA1

      f3714edb96b5db59b392058292ed486dfd3d3629

    • SHA256

      de69281050c18627c8e75a3f4cdf933db77ace2a8dd13ef753f61ad6e0a405ad

    • SHA512

      2477b8432ffd9a0873608d978b30a8eea129d6180a18437a3a204c875ec2469e4eb0db2a6c52b6d2bb3e1881fcb0e1e29934d73608499694545cfdda5bf53494

    • SSDEEP

      49152:qpUPqczdMZnZajVw8XsmOL8ruQO7/rsGQNTRJD+jQW/XRaWEr1bCU:qpmBUZaZw8u8rJOjrsG2apKGU

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Modifies file permissions

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks