General

  • Target

    63504a7e967d5983fd36d4b4c96284332104758a19dbc9c7a0ff4225d6f8ff13.zip

  • Size

    2.4MB

  • Sample

    240402-l62j7aef88

  • MD5

    467111220a215dcd6d9c7bff4e932fbb

  • SHA1

    c25c0a54b4eb72dd8ca54b23c0dd1ff35dee8b47

  • SHA256

    b562465596758bdb582408977839685bee6499dc2b92f3a82bc8bfa3dd13a173

  • SHA512

    1fa43b28c3bdd2830b98fab50cf48e777b4753b3f819d99de0498a5ac2ccfb141c9cc09399551c9606ef0cd1b3a83d5ec74b72842ffd5a11a643601b155ac998

  • SSDEEP

    49152:boc94gqwYuQfydVGrB7sgJfidmW47KYjEmrIpnVu8BsKYEvr1AF:XYukKVI70dmxBrIBVu8BsKHzE

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

prodomainnameeforappru.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    WeBiMyRU

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      build-x64.msi

    • Size

      5.8MB

    • MD5

      2999391319cda1be5dacfaf5b05062b2

    • SHA1

      c983b7dff2ea4c63f3944e639eb54d0e6b0b655f

    • SHA256

      3bf99810510c197b9cd6e434d95417515dbc42f94b11bbf9916ec160066eb77e

    • SHA512

      1b9a7e5211979f37097c28122cbe99b5ec81ca3caa07944ddaba1afb2515ef3545f92bce35efa87914221016867f88b9b64c7a6a07e8e3f0cb556182047c7f27

    • SSDEEP

      49152:NpUPFUhtSTK+0THkWsN8SDYdvH5eoQDWeEHHhRgWEF9nuriG7DrFWoRRRJuGgagL:NpMnFDcEWoVoFWRGga5q

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks