General

  • Target

    4_10_AC-3010.xlsx

  • Size

    51KB

  • Sample

    240410-w88fmagb53

  • MD5

    7c265753eddf8443ad04c994b063f622

  • SHA1

    a770cd22f58c78979d689f1db45ec05973e2d815

  • SHA256

    c0bdda3b38fb62f8de43d24640c8db5f0e883836d704041dd1f7c338f2709d02

  • SHA512

    7aacf817f45072c20e27f544e1f9464a3db0849a7797fe9a247455c9301c16af3077b45729da03b731c2cc1a75c7d29717abc8e0515511336067da829167a10e

  • SSDEEP

    1536:4s1eZDHgM8v42wkYq84lKL7IAnA4xCQH140sXe:V1eZcMetF8T7IAA4xprsu

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

wassonite.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    jdfEdKYT

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      4_10_AC-3010.xlsx

    • Size

      51KB

    • MD5

      7c265753eddf8443ad04c994b063f622

    • SHA1

      a770cd22f58c78979d689f1db45ec05973e2d815

    • SHA256

      c0bdda3b38fb62f8de43d24640c8db5f0e883836d704041dd1f7c338f2709d02

    • SHA512

      7aacf817f45072c20e27f544e1f9464a3db0849a7797fe9a247455c9301c16af3077b45729da03b731c2cc1a75c7d29717abc8e0515511336067da829167a10e

    • SSDEEP

      1536:4s1eZDHgM8v42wkYq84lKL7IAnA4xCQH140sXe:V1eZcMetF8T7IAA4xprsu

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks