General

  • Target

    statapril2024-5892.xlsx

  • Size

    56KB

  • Sample

    240409-yrkpcagg73

  • MD5

    25f201c3b20150d61623fb8c06402eae

  • SHA1

    81045db4d69c571e3839260ec3bbe68d214ca43f

  • SHA256

    4721df75d7bb85128d6968110264e5e5054f68d30703421bb0e120424c838157

  • SHA512

    eca67412e299d09db028022b7f472a39261795e623a4ddcd98a66c322c482e8a8e10321475f92791f321caf4cfba3db85ffa9e0452bc78f1d411cb45414fc175

  • SSDEEP

    768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5ke:/mZ2u4OPKIxoEuDKJnlve

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

103.124.106.237

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    bedxvHpr

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      statapril2024-5892.xlsx

    • Size

      56KB

    • MD5

      25f201c3b20150d61623fb8c06402eae

    • SHA1

      81045db4d69c571e3839260ec3bbe68d214ca43f

    • SHA256

      4721df75d7bb85128d6968110264e5e5054f68d30703421bb0e120424c838157

    • SHA512

      eca67412e299d09db028022b7f472a39261795e623a4ddcd98a66c322c482e8a8e10321475f92791f321caf4cfba3db85ffa9e0452bc78f1d411cb45414fc175

    • SSDEEP

      768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5ke:/mZ2u4OPKIxoEuDKJnlve

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks