General

  • Target

    15032024_0927_EXCEL_OPEN_DOC.vbs

  • Size

    14KB

  • Sample

    240315-bt3xdadc4y

  • MD5

    e9da2f1fbf627a05811cf294a1136a64

  • SHA1

    792924ff455d06257c226f7f276d8776389b0b5a

  • SHA256

    ba8f84fdc1678e133ad265e357e99dba7031872371d444e84d6a47a022914de9

  • SHA512

    150c1f8cb56e500d9459c05ec17908134a2e52b2e3e229c8e85eaac6b7985e788765c60a11984452456176e95f4d0b0242dfd69f84b94f101a68ddec470438c7

  • SSDEEP

    192:YMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nN6U5UTUBUF:jy19gR3IquNgzG2oNdOdEpeeqlPk

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

nextroundst.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    NeONIafa

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      15032024_0927_EXCEL_OPEN_DOC.vbs

    • Size

      14KB

    • MD5

      e9da2f1fbf627a05811cf294a1136a64

    • SHA1

      792924ff455d06257c226f7f276d8776389b0b5a

    • SHA256

      ba8f84fdc1678e133ad265e357e99dba7031872371d444e84d6a47a022914de9

    • SHA512

      150c1f8cb56e500d9459c05ec17908134a2e52b2e3e229c8e85eaac6b7985e788765c60a11984452456176e95f4d0b0242dfd69f84b94f101a68ddec470438c7

    • SSDEEP

      192:YMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nN6U5UTUBUF:jy19gR3IquNgzG2oNdOdEpeeqlPk

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks