General

  • Target

    c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e.xlsx

  • Size

    56KB

  • Sample

    240403-t8egfafe81

  • MD5

    950c7daa701f5f4bbb3fc72ce1d003f0

  • SHA1

    396be2776d4625b386a3ff4dcce8d840e1e2e3de

  • SHA256

    c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e

  • SHA512

    9d192f5a701cb81fb2e0f7054a82e1629ff6b832066277dfe108a940b39f680deba2e1ffbb49b77468b2d5a534650aa68107a0376efd9851bfddf484204a445d

  • SSDEEP

    768:ZFSadDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq51s5:LZ2u4OPKIxoEuDKJnlqs5

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

irreceiver.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    zvRxAJTe

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e.xlsx

    • Size

      56KB

    • MD5

      950c7daa701f5f4bbb3fc72ce1d003f0

    • SHA1

      396be2776d4625b386a3ff4dcce8d840e1e2e3de

    • SHA256

      c788865f66a500b7555f78979d2874f066de21384d0fef3707785a450cd8df0e

    • SHA512

      9d192f5a701cb81fb2e0f7054a82e1629ff6b832066277dfe108a940b39f680deba2e1ffbb49b77468b2d5a534650aa68107a0376efd9851bfddf484204a445d

    • SSDEEP

      768:ZFSadDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq51s5:LZ2u4OPKIxoEuDKJnlqs5

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks