Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2024 16:32

General

  • Target

    fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe

  • Size

    423KB

  • MD5

    3c609ac6b2de29578a2383d71e12caa9

  • SHA1

    bb0061eca413d4fe67e6b9a7aa281f0aaea3c8b2

  • SHA256

    fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241

  • SHA512

    0475c274c0e0541cae744342d339f03f49bfd2e0f820ec89b1432cdeee9ab17e2c956acfc431691bd04cebd381916284cd0c3fa2e9275a1c34afff92cdec0784

  • SSDEEP

    6144:6KaDxUgUvVcmX+IosmZepDouQBYwZE/pfGx0oagug/Jyb1F5S7NGNh/:XUxGcmXPosmZepUuQBYFTgBsF5o2

Malware Config

Extracted

Family

darkgate

Version

6.1.7

Botnet

admin888

C2

stachmentsuprimeresult.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    bIlTdjHV

  • minimum_disk

    29

  • minimum_ram

    6050

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    false

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 14 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe
    "C:\Users\Admin\AppData\Local\Temp\fd654d05a7124bfccd117ba172b7c75bf4a2da6d37111f7f21c3b6d946bc7241.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/876-1-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-2-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-3-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-4-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-5-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-6-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-7-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-8-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-9-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-10-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-11-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-12-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-13-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/876-14-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB