General

  • Target

    statapril2024-1353.xlsx

  • Size

    56KB

  • Sample

    240409-sdxh4ade6w

  • MD5

    d1565887c88e31fe8de1d68832f52bb9

  • SHA1

    580731aa5c735a3051883cbabc1b36c63fdc4bcd

  • SHA256

    6a20b1568c0edaede64a58f2843b68a6a098cc99bd4554c7bfc339bfb4d67338

  • SHA512

    8e7fecb175eb507d3468b645a8474eaa4c0518832b32328dbf949c1f1adbb821d43a82103d539e71b259232457ad16d6a33e80d819b078ea34e4fa9c797b47a4

  • SSDEEP

    768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5ndm:/mZ2u4OPKIxoEuDKJnlCm

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

103.124.106.237

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    bedxvHpr

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      statapril2024-1353.xlsx

    • Size

      56KB

    • MD5

      d1565887c88e31fe8de1d68832f52bb9

    • SHA1

      580731aa5c735a3051883cbabc1b36c63fdc4bcd

    • SHA256

      6a20b1568c0edaede64a58f2843b68a6a098cc99bd4554c7bfc339bfb4d67338

    • SHA512

      8e7fecb175eb507d3468b645a8474eaa4c0518832b32328dbf949c1f1adbb821d43a82103d539e71b259232457ad16d6a33e80d819b078ea34e4fa9c797b47a4

    • SSDEEP

      768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5ndm:/mZ2u4OPKIxoEuDKJnlCm

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks