General

  • Target

    0c1b18a8b3f56fc02b245168b55972936a72ffd2dd1746e92b6a35cc25d9a713

  • Size

    48KB

  • Sample

    240315-xb6ffaaa68

  • MD5

    20f8bdd84478f811b74d653f584e69a3

  • SHA1

    b194986696464d38bae10ffff7364cfc73de401c

  • SHA256

    0c1b18a8b3f56fc02b245168b55972936a72ffd2dd1746e92b6a35cc25d9a713

  • SHA512

    dc0e9a90472c4d05331a0039a384f164d707704a8c7d5fa92f631568a2dcd510ead7225b2dc54c1bd7fda5779c8556234f9b7192e4275e5cecdcd36cb8487498

  • SSDEEP

    768:ZFlppbq6i4Y/TJC4xJMxXcvFLwAPq4Sxv9PvEgzegYN1T/Y:tLq94YV7JMxXyd4x+gzexTg

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

diveupdown.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    VfiPBBhr

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      0c1b18a8b3f56fc02b245168b55972936a72ffd2dd1746e92b6a35cc25d9a713

    • Size

      48KB

    • MD5

      20f8bdd84478f811b74d653f584e69a3

    • SHA1

      b194986696464d38bae10ffff7364cfc73de401c

    • SHA256

      0c1b18a8b3f56fc02b245168b55972936a72ffd2dd1746e92b6a35cc25d9a713

    • SHA512

      dc0e9a90472c4d05331a0039a384f164d707704a8c7d5fa92f631568a2dcd510ead7225b2dc54c1bd7fda5779c8556234f9b7192e4275e5cecdcd36cb8487498

    • SSDEEP

      768:ZFlppbq6i4Y/TJC4xJMxXcvFLwAPq4Sxv9PvEgzegYN1T/Y:tLq94YV7JMxXyd4x+gzexTg

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks