General

  • Target

    06032024_0006_setup.js

  • Size

    32KB

  • Sample

    240305-tj3gzabg48

  • MD5

    91129aacf3e4d87a776ca1ee9e358eb2

  • SHA1

    3e66e0e3eb6d17055ca1acca942c592141ad8261

  • SHA256

    e06efa3ff72da4a73045d31e888e001041a0e9058266d893fda525a90ab4e94c

  • SHA512

    975f722719311ebf1a6bee5f17b14e131bd613e955b2bee17401c5af864d08a68240748af08ccb9da957fe2565972339baade1534d0ad018e7a266ce469f0f34

  • SSDEEP

    768:rnJRkBVRaR9z6kNyRoRmG6o463cR4RenBRk6ORJRuRzRlnJRkBVRaR9z6kNyRoRx:rnJRkBVRaR9z6kNyRoRmG6o463cR4ReL

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

afdhf198jfadafdkfad.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    lrDcZuOq

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      06032024_0006_setup.js

    • Size

      32KB

    • MD5

      91129aacf3e4d87a776ca1ee9e358eb2

    • SHA1

      3e66e0e3eb6d17055ca1acca942c592141ad8261

    • SHA256

      e06efa3ff72da4a73045d31e888e001041a0e9058266d893fda525a90ab4e94c

    • SHA512

      975f722719311ebf1a6bee5f17b14e131bd613e955b2bee17401c5af864d08a68240748af08ccb9da957fe2565972339baade1534d0ad018e7a266ce469f0f34

    • SSDEEP

      768:rnJRkBVRaR9z6kNyRoRmG6o463cR4RenBRk6ORJRuRzRlnJRkBVRaR9z6kNyRoRx:rnJRkBVRaR9z6kNyRoRmG6o463cR4ReL

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Blocklisted process makes network request

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks