General

  • Target

    2a4b987fdbd42a6a5cfbfdc334ce634f.bin

  • Size

    1KB

  • Sample

    240328-bhytaaab23

  • MD5

    a338511bd6ca0aff81858e39f345e66f

  • SHA1

    7cb41ce7d8594e0c155b0d3df23c1c5ab1143cec

  • SHA256

    3fbea74afb2d9d97c82f47589615754b87d5efaed51217422fc86cab2bddca27

  • SHA512

    cf1c4ef39ceada09ba58a8e7173ad1416ab0b0a65d3c7d20a8f4b171d0149b7b94f688d14eb28017c5eb86039287a070b48816bc1f65885069357faab95c17cd

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

backupitfirst.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    SfUQxDje

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      cb65d95a1496fd2e5105954eb3046df90c4262f19fa7d7d77fa59b488348b040.vbs

    • Size

      6KB

    • MD5

      2a4b987fdbd42a6a5cfbfdc334ce634f

    • SHA1

      9964d7287bb64f36231b751eb80608176fc8b687

    • SHA256

      cb65d95a1496fd2e5105954eb3046df90c4262f19fa7d7d77fa59b488348b040

    • SHA512

      4aabaf92a6bf309869ee2ab6eabb9081bb4b5fc57362d9b343fdc7e8eb010ef66512aa5e80056cdb9501f0602d413d325ccc81f1cff3ebe7756167d163d09b80

    • SSDEEP

      192:QMg119gkCtL3IqSPN3QzGNzUoNK9V4nN9:Ly19gR3IquNgzG2oN7r

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks