General

  • Target

    63504a7e967d5983fd36d4b4c96284332104758a19dbc9c7a0ff4225d6f8ff13.zip

  • Size

    2.4MB

  • Sample

    240402-mpfrtsfg83

  • MD5

    95bc0507e047c77b9362582791020fc8

  • SHA1

    ea3db40e30d76d3bb2625ca67e6e03b3550ce630

  • SHA256

    e10ebb5b883b98fffa190aa1434e81aef3d88342db7ddace332f24a533c78642

  • SHA512

    3f9ec122e90bff51cc8a1bef210a5d3ecf75f917a1667d0fb37473a27315a818af730445c75cccd9490c72ac9cb69b71b13598fd16192adca11e1e70a2b4135e

  • SSDEEP

    49152:XK4clr9cUxwGTmAS+LTM43Tdbtuugd2AQJbfXoeJWzFG02Fg3i:clCBGT/nTVZQinJDpkJKCi

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

prodomainnameeforappru.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    443

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    WeBiMyRU

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      build-x64.msi

    • Size

      5.8MB

    • MD5

      2999391319cda1be5dacfaf5b05062b2

    • SHA1

      c983b7dff2ea4c63f3944e639eb54d0e6b0b655f

    • SHA256

      3bf99810510c197b9cd6e434d95417515dbc42f94b11bbf9916ec160066eb77e

    • SHA512

      1b9a7e5211979f37097c28122cbe99b5ec81ca3caa07944ddaba1afb2515ef3545f92bce35efa87914221016867f88b9b64c7a6a07e8e3f0cb556182047c7f27

    • SSDEEP

      49152:NpUPFUhtSTK+0THkWsN8SDYdvH5eoQDWeEHHhRgWEF9nuriG7DrFWoRRRJuGgagL:NpMnFDcEWoVoFWRGga5q

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks