General

  • Target

    ESAREA-ngoowrejjdebusx-1710889917.xlsx

  • Size

    56KB

  • Sample

    240320-p46ynsha22

  • MD5

    e561b5787c53f30780f0253e72fc87ea

  • SHA1

    25c17311027b20774c96e16fd0557c1899ca8c1a

  • SHA256

    60332509742968a19b12375d995fa5f9c695962c08f7df4fe0dc1ef83fbdcfea

  • SHA512

    484cd13d83295a1d4c203e41cf6c2bd577683fef6872b7c317de7cdef096023bf39267474803189495cb22c7b824113101e1c4ad26d9ec79e5cc8776b1737357

  • SSDEEP

    1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTo:FSoEOfEgMNdxI5yYhgu5zBRY0

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

badbutperfect.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    WZqqpfdY

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      ESAREA-ngoowrejjdebusx-1710889917.xlsx

    • Size

      56KB

    • MD5

      e561b5787c53f30780f0253e72fc87ea

    • SHA1

      25c17311027b20774c96e16fd0557c1899ca8c1a

    • SHA256

      60332509742968a19b12375d995fa5f9c695962c08f7df4fe0dc1ef83fbdcfea

    • SHA512

      484cd13d83295a1d4c203e41cf6c2bd577683fef6872b7c317de7cdef096023bf39267474803189495cb22c7b824113101e1c4ad26d9ec79e5cc8776b1737357

    • SSDEEP

      1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTo:FSoEOfEgMNdxI5yYhgu5zBRY0

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks