General

  • Target

    a31ac963ee344678ec4386bdac3a9c9cf2804049cb81e5b0daeb65082da09b32.zip

  • Size

    1.9MB

  • Sample

    240402-l64pjsec3w

  • MD5

    4b202a6423fffd66ada6431fbfb22fac

  • SHA1

    7597c5f31760c926ef16dfc231cab3b62fe364bd

  • SHA256

    d9b23ee41e905264e77a813a9c9386cb7bb1ead10c3df4513a818df1f42e96eb

  • SHA512

    4f6e36e082ffdaaccb7cb7219f8f4154113244091bb4111e2e2eadc25ac6265c07c109f64103e25148c298d9241db9fcd1aeaede2d22b5b5ed91302271744a59

  • SSDEEP

    49152:F9v+A3WnqY/3UtxSzs3z8pLYYFImmt/Q9asoX8JFD+f45z/zdHe:FB4ktYbLNGYDos1z/h+

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

jenb128hiuedfhajduihfa.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    RZymDRsm

  • minimum_disk

    100

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Extracted

Family

darkgate

Version

6.1.7

Botnet

admin888

C2

jenb128hiuedfhajduihfa.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    RZymDRsm

  • minimum_disk

    100

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      mkreafr.msi

    • Size

      4.3MB

    • MD5

      4f238c2093606fc296f1f819c2f0fc67

    • SHA1

      f8535858fcee6b96e0f49e6156fa110fc0698880

    • SHA256

      58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994

    • SHA512

      c2422db8871d6303b5903c4b11cca3debd62cb25a406655db5a0ba407f33c9fef739371d297e5ccad45efc99e040e6ae29079b4b9325f52d54c5e780f8c346f7

    • SSDEEP

      49152:jpUPN9qhCxzT+WKjSXcmNt6+XzP4BYIeBfCXqyfdo1DDDDDDDDDDPuDgO9hTnxA5:jpqCQbm+jg12f3yaiga6yU

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Modifies file permissions

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks