General

  • Target

    fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.zip

  • Size

    2.2MB

  • Sample

    240402-l658daec4y

  • MD5

    a16ed839c65ba4826212ee3b13bbaa17

  • SHA1

    b44ff498d9a9cdeb21db8f9e6d35185bef6aed3b

  • SHA256

    055dc72cd2af80398db4c677048d824d8aeae6da33a1b0e2901a9730e68ba9b9

  • SHA512

    d87c2b0912eddba151913ec543bd707e3b7d0731c5249c8683a870c3c82322864749e3ad2541f240a9934c1a1828b78b84e8753f6eeaf6c3fa8f78c713d58b65

  • SSDEEP

    49152:Xntth2xNBMBBaESleiUfbViMYNkNyet6m2MbScNstlMVhmkwp:Xntt4rBMBRTEObclVcN/mJ

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

stachmentsuprimeresult.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    veVumtze

  • minimum_disk

    30

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112.msi

    • Size

      4.3MB

    • MD5

      b88352bde539f79207be209759505f02

    • SHA1

      8ede7ee0a43c4282b41687408ddc38a243ac4bfd

    • SHA256

      fc6ab939f5f2d6f12cb1edbe2babd5b180d8d036fc0b37a77f784d1c52162112

    • SHA512

      104d4330c05e41d2039a0b61438565c88138ec9b2c55632ab0ec8eaf70840b095e1dd5bb5d55b65373099df80896632499ff5b3c85240d7a389824cb72268921

    • SSDEEP

      49152:zpUPB9qhCxzT+WKjSX15zLVI4vLeY9xV4qtGvmKBteU5oBgffUBS88qAU8:zpECQ1FLeYLVTV4WMVf

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks