Resubmissions

19-03-2024 18:01

240319-wl6crabc6t 10

19-03-2024 16:49

240319-vbm8ragh33 1

General

  • Target

    march19-D3145-2024[1314225].xlsx

  • Size

    56KB

  • Sample

    240319-wl6crabc6t

  • MD5

    60d07f9e7daf81bb5a9bb4b3bed41bfd

  • SHA1

    2757c793b96639f3bca33bdd07576d3ad95d063b

  • SHA256

    2766eeb9422ef9dccc1f208e7cbb807c57decae2b08d82995aaf897a67583c94

  • SHA512

    a90b3a0d6af36d1b404d687d71b8d59f234129cfefe972381af5479c4501cf2d513b7131c4107a7a0ab45d4a5722f7e0854e5ff52578b4bcfcdaae8dc5c49a45

  • SSDEEP

    1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTE:FSoEOfEgMNdxI5yYhgu5zBRYg

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

badbutperfect.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    WZqqpfdY

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      march19-D3145-2024[1314225].xlsx

    • Size

      56KB

    • MD5

      60d07f9e7daf81bb5a9bb4b3bed41bfd

    • SHA1

      2757c793b96639f3bca33bdd07576d3ad95d063b

    • SHA256

      2766eeb9422ef9dccc1f208e7cbb807c57decae2b08d82995aaf897a67583c94

    • SHA512

      a90b3a0d6af36d1b404d687d71b8d59f234129cfefe972381af5479c4501cf2d513b7131c4107a7a0ab45d4a5722f7e0854e5ff52578b4bcfcdaae8dc5c49a45

    • SSDEEP

      1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTE:FSoEOfEgMNdxI5yYhgu5zBRYg

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks