General

  • Target

    17042024_0931_ndvdiok.vbs

  • Size

    1KB

  • Sample

    240417-bxph6ahh88

  • MD5

    32f61baa669991fb989439babaf493ff

  • SHA1

    4242d545077e3e643854e3148e00c8283533b9ab

  • SHA256

    75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14

  • SHA512

    d20bf0b9a664caa9e9fe18dcb3899182b8f8bbb0275907bec6e3e888c0d2cd36a17ba24c49a3b92910ee075e6309aef5b8cf9392acf5833d66c0fbdcd3fdc2df

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

backupssupport.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    rNDPYLnH

  • minimum_disk

    50

  • minimum_ram

    4000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      17042024_0931_ndvdiok.vbs

    • Size

      1KB

    • MD5

      32f61baa669991fb989439babaf493ff

    • SHA1

      4242d545077e3e643854e3148e00c8283533b9ab

    • SHA256

      75db6f949461cb03a155dd26c781a3c9e00edb917275f3b4d306b7094ed06a14

    • SHA512

      d20bf0b9a664caa9e9fe18dcb3899182b8f8bbb0275907bec6e3e888c0d2cd36a17ba24c49a3b92910ee075e6309aef5b8cf9392acf5833d66c0fbdcd3fdc2df

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks