Analysis

  • max time kernel
    133s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 01:24

General

  • Target

    07052024_0123_darkgate_0605.exe

  • Size

    461KB

  • MD5

    a5b4ba1f40f93990a416afb13e5dfef4

  • SHA1

    1c3dabef009868490bc8ab6111625923f8f1c832

  • SHA256

    edb3b72fc4d9ee17320e679ed2d2ed97f1590d535d03a3398380fdb1c7c14b96

  • SHA512

    73a17ddfa72709f06b97e1d54b27c253bad798022ed6ca12377644b9fb4727fa87f8a33f2d0c45eb522ce661a983e59b36ad9cd560009aaf642abef2b34af28e

  • SSDEEP

    12288:UqilipcPNrKEj2R1zNAYFWtInQnqnVrG:UhljPNrKEjezNAYFQGC2

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

updateleft.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    SbCjRKFB

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07052024_0123_darkgate_0605.exe
    "C:\Users\Admin\AppData\Local\Temp\07052024_0123_darkgate_0605.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3916-1-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB