General

  • Target

    38c2831d236cca17e7a907073eb60c718ca0ab35cbaf71bc63bf8d45b74deb2b

  • Size

    193KB

  • Sample

    240417-qwv2wabd8t

  • MD5

    d913f0f2e2905fb8029d6e0ac804d43d

  • SHA1

    88999854ba2a703fc17e72fb11907772b9f55b49

  • SHA256

    38c2831d236cca17e7a907073eb60c718ca0ab35cbaf71bc63bf8d45b74deb2b

  • SHA512

    f37393c4dd3613e8992db4f809154cdd6ebe6e95668ae72326d9a7ad2b641aba99bb28f79b8c71896eb1a32c4a73b0b959da2fa02437751ded36405798ab1d97

  • SSDEEP

    6144:Jrexotjn/ZkddkO+HQn4zF6rVkkNspShb:JyK1xkYO+HQnNZ9sQ

Malware Config

Extracted

Family

darkgate

Version

5.2.4

Botnet

civilian1337

C2

http://185.130.227.202

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    true

  • crypto_key

    VPsTDMdPronzYs

  • internal_mutex

    txtMut

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    civilian1337

Targets

    • Target

      c36f35e271e0e7c345ca701c782605a2f899aa6f30f13d06ab7541244c8a8229.exe

    • Size

      405KB

    • MD5

      52fc04a1017bff949d2531942491e7d9

    • SHA1

      0f23ac4f5dc0603894374026349d7db0f870ee91

    • SHA256

      c36f35e271e0e7c345ca701c782605a2f899aa6f30f13d06ab7541244c8a8229

    • SHA512

      920905dc5d7c25daf2ba38daeeeab8ffe883023905ecb166f585346b012caeb3629e12400ca0df4c24e23d2abdea8081f7272d3b1385121ffc301f2982a10c85

    • SSDEEP

      12288:0UEpOEWzuYzy/Bda9AlxhwcySTcth/4N:0fOEWjyZda9uhwlSIf4

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

MITRE ATT&CK Enterprise v15

Tasks