General

  • Target

    AZURE_DOC_OPEN.vbs

  • Size

    12KB

  • Sample

    240320-p7p5bsha54

  • MD5

    802e03ffd6498ec9693848197fe4d2e5

  • SHA1

    958dfdadcd0f21d801561b94c23b8b3d6e5f4688

  • SHA256

    b3a8c88bdd9701a5ca532e0b433944e0992a3ae90e0bb974b2d091b2a01efb94

  • SHA512

    06d886eb039d120372a112c1f2c1a399d788800bd6ffc5892dd9e38f6ee4f8c7c2125e654248f2df24016276fedd52c6f7f30146d34a46ccb217b72abcbefb4a

  • SSDEEP

    192:oMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nN6UX:Ty19gR3IquNgzG2oNdOdEpeeqlPX

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

badbutperfect.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    WZqqpfdY

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      AZURE_DOC_OPEN.vbs

    • Size

      12KB

    • MD5

      802e03ffd6498ec9693848197fe4d2e5

    • SHA1

      958dfdadcd0f21d801561b94c23b8b3d6e5f4688

    • SHA256

      b3a8c88bdd9701a5ca532e0b433944e0992a3ae90e0bb974b2d091b2a01efb94

    • SHA512

      06d886eb039d120372a112c1f2c1a399d788800bd6ffc5892dd9e38f6ee4f8c7c2125e654248f2df24016276fedd52c6f7f30146d34a46ccb217b72abcbefb4a

    • SSDEEP

      192:oMg119gkCtL3IqSPN3QzGNzUoNzhLnOdEpeLSHZgNdPR/Dnm9V4nN6UX:Ty19gR3IquNgzG2oNdOdEpeeqlPX

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks