General

  • Target

    6be88c44036a6b48e179d8ad2b8f2c049a1fb196b4174716318ae4f94f9a77d4.zip

  • Size

    2.4MB

  • Sample

    240402-qexjdaah3t

  • MD5

    3108fe442b1045a4d465b2d860ffa34d

  • SHA1

    0c0e623e97b177da514f22f0971068ea27ba2372

  • SHA256

    23414832a3600faafdf8fdbacea755706b971f105bfb6088b7fb874a80e32e21

  • SHA512

    82a898c9fde20527092a36192f945dfa6222ced07430dc9229eccb647c213ac9785cc67b4e87b1669cd5c98c1e2a4f21e8bf44c0cbe8bbe2892bc9d9e4ec6c80

  • SSDEEP

    49152:Rvz4ZIn8zJ90NVN7yBuIBhN2sYPdHHAkeksjS68d/W1KdOWb3R0:Rr4un81eVN7yuurugkeksu68d/W1Kt+

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

prodomainnameeforappru.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    true

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    VzXLKSZE

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      build-x64.msi

    • Size

      5.8MB

    • MD5

      9c02a9298b97fcfc5a75fbedf08002bd

    • SHA1

      2d3bc2856c015914f2856331a0315298f3c34b0c

    • SHA256

      693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a

    • SHA512

      fafe5dddb610068cb1044c803a6d681d1739904d8e0c4b2b0fc05bcd55cf9344f69e77c8627ae73713f759117d81a78855ff937ee8650b47ab18d37cb9ca34bc

    • SSDEEP

      49152:ppUP3UhtSTK+0THkWsN8SDYdvH5eoQDWhbHHhZgWEF94FJy5jvrgFdbBUleY82cp:pp6nFDkEWoyvy5jvcdbBUkYC+XCFmpC

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks