Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 16:41

General

  • Target

    06032024_0041_drkgate_0503.exe

  • Size

    423KB

  • MD5

    2697586ee6b48d85ac2f45c9236dbb8f

  • SHA1

    3a46a7d938b38580cf36089bb50c98dae7cf0304

  • SHA256

    89ad6083de9e791d0a5cf754f4a0a4f54a9e6e1a1b7d8d3dd4726da182c4be65

  • SHA512

    d93fdd6241f6998bea812ad08ab6d6b01ba419350c8d8085b2bb0958b967d8f4713fdb5ce1d603e14009c890a8a1222876b7e7eceae598d578308ea3a5c56da2

  • SSDEEP

    6144:KKaalz2tR/S8aBgpfyS3l9QKp2PevGLAgnPXUoarrUEwmhcQ+/EThifATp4C:naal2Naqpfyuv9p2PeiKQEJ/+/E1iRC

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

afdhf198jfadafdkfad.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    lrDcZuOq

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\06032024_0041_drkgate_0503.exe
    "C:\Users\Admin\AppData\Local\Temp\06032024_0041_drkgate_0503.exe"
    1⤵
    • Checks processor information in registry
    PID:3176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3176-1-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB