General

  • Target

    report-(721490)-2024.html

  • Size

    3KB

  • Sample

    240327-zxtd4sfc6y

  • MD5

    d6207a7c2d321188c004d77baacabba7

  • SHA1

    0772674e0b4ed9a45d617e9c84dde1f76dfb9375

  • SHA256

    280b45fb30ca137e582f5147af08ff310034aa9b368299e76c180b65ad81b93c

  • SHA512

    080c587158ff0fe2bc687e31b1d613ca7dd38338ec82db40a0004ca2415993cf01eff548e0fdef53bb6c253ad2284e6f208df6c9987eafce60d0233925e02c6b

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

withupdate.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    VqunyHFY

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      report-(721490)-2024.html

    • Size

      3KB

    • MD5

      d6207a7c2d321188c004d77baacabba7

    • SHA1

      0772674e0b4ed9a45d617e9c84dde1f76dfb9375

    • SHA256

      280b45fb30ca137e582f5147af08ff310034aa9b368299e76c180b65ad81b93c

    • SHA512

      080c587158ff0fe2bc687e31b1d613ca7dd38338ec82db40a0004ca2415993cf01eff548e0fdef53bb6c253ad2284e6f208df6c9987eafce60d0233925e02c6b

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks