General

  • Target

    6be88c44036a6b48e179d8ad2b8f2c049a1fb196b4174716318ae4f94f9a77d4.zip

  • Size

    2.4MB

  • Sample

    240402-mpf3lafc81

  • MD5

    5b9a5b291339a04f87243f1c6f348e61

  • SHA1

    71bf3a7838582bd54db3a090ee5b63401f345ba5

  • SHA256

    b896231ec3f5c0300062abdb15f6711fd16e7def98f0c78a685a68d20ecb4aa3

  • SHA512

    02aacec36da2c7ff8584c06f3e1b4dbef23eb8e78ceebbb4afcff8fba086bb2ade8abcdc760e6274eff742d30639362402a4378d6587ec80322420dd1cc1e150

  • SSDEEP

    49152:4t0wEUA01sq2y5EHLwHwmCHQWYDSOMKe/eE+6QSWhGRSwx8GBCUGQjw:4ltCq2U2XuWYDSOOT+FJGJa0CUGMw

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

prodomainnameeforappru.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    true

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    VzXLKSZE

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      build-x64.msi

    • Size

      5.8MB

    • MD5

      9c02a9298b97fcfc5a75fbedf08002bd

    • SHA1

      2d3bc2856c015914f2856331a0315298f3c34b0c

    • SHA256

      693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a

    • SHA512

      fafe5dddb610068cb1044c803a6d681d1739904d8e0c4b2b0fc05bcd55cf9344f69e77c8627ae73713f759117d81a78855ff937ee8650b47ab18d37cb9ca34bc

    • SSDEEP

      49152:ppUP3UhtSTK+0THkWsN8SDYdvH5eoQDWhbHHhZgWEF94FJy5jvrgFdbBUleY82cp:pp6nFDkEWoyvy5jvcdbBUkYC+XCFmpC

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks