General

  • Target

    693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.zip

  • Size

    2.4MB

  • Sample

    240402-l62vysec2y

  • MD5

    c934fb8ec15ab5cbac6bae06ffd40dbe

  • SHA1

    6ba0072693d34fbc43e390a12f25cc59470e5783

  • SHA256

    fa8b324e7b3522c34e312fdce22613359ad82d9ba96e197ed63e2fda7b8f78c5

  • SHA512

    f5382ba2ffc352c9c40ed6f1c61cd82bb65530e2a9f49bad1f346fd496f1aa36a812c83742981297ef2943cdf456472f84a1b20e3a3e947df6c9cc72ce123d2c

  • SSDEEP

    49152:RBU2cjDkaGtqvjO2Dnb7NvetOFcsTkxz7x7fRAXe+h9YZ4EUvqRkmXGtPpzigxiX:RncjDkaDvfbRvetA3Taz7Fx+jYZ45qRv

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

prodomainnameeforappru.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    true

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    VzXLKSZE

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi

    • Size

      5.8MB

    • MD5

      9c02a9298b97fcfc5a75fbedf08002bd

    • SHA1

      2d3bc2856c015914f2856331a0315298f3c34b0c

    • SHA256

      693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a

    • SHA512

      fafe5dddb610068cb1044c803a6d681d1739904d8e0c4b2b0fc05bcd55cf9344f69e77c8627ae73713f759117d81a78855ff937ee8650b47ab18d37cb9ca34bc

    • SSDEEP

      49152:ppUP3UhtSTK+0THkWsN8SDYdvH5eoQDWhbHHhZgWEF94FJy5jvrgFdbBUleY82cp:pp6nFDkEWoyvy5jvcdbBUkYC+XCFmpC

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks