General

  • Target

    fud_cr1.exe

  • Size

    3.7MB

  • Sample

    240611-bry6eaydjf

  • MD5

    e2a190eebb641569fffb199c61b54260

  • SHA1

    5c6268c2eb9010f08adc72fbf49343ed632b187d

  • SHA256

    a95c91ef6f6c5c62046ebce65b674f077a7ed07877199944095ab021c840af58

  • SHA512

    f04c16ea16ece51d100602edc45b42843fcddefd93c5fd9d622a68fc625bc568cc2af1b0f28460fce46d83fba80e7183710ecf9dbabe0a2a52a1b1feb6f50243

  • SSDEEP

    49152:kk4A9Ua1kQwVseu5kvIuhpxuD4UbO0FbmCcc5:k4Ua1kFVN8kAuh30Fbm

Malware Config

Extracted

Family

darkgate

Botnet

x6x6x7x77xx6x6x67

C2

dr-networks.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    swMFGADk

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    x6x6x7x77xx6x6x67

Targets

    • Target

      fud_cr1.exe

    • Size

      3.7MB

    • MD5

      e2a190eebb641569fffb199c61b54260

    • SHA1

      5c6268c2eb9010f08adc72fbf49343ed632b187d

    • SHA256

      a95c91ef6f6c5c62046ebce65b674f077a7ed07877199944095ab021c840af58

    • SHA512

      f04c16ea16ece51d100602edc45b42843fcddefd93c5fd9d622a68fc625bc568cc2af1b0f28460fce46d83fba80e7183710ecf9dbabe0a2a52a1b1feb6f50243

    • SSDEEP

      49152:kk4A9Ua1kQwVseu5kvIuhpxuD4UbO0FbmCcc5:k4Ua1kFVN8kAuh30Fbm

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Enterprise v15

Tasks