General

  • Target

    cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c

  • Size

    3.8MB

  • Sample

    240611-xfdwzsxckc

  • MD5

    b2d33941295f236bebee0d3c389a8549

  • SHA1

    76bfc480242219d14cfbbb8dd7628c3c9bde7f7d

  • SHA256

    cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c

  • SHA512

    c7a8a877a93590876221c9bf0c21e04b78a8a8af415c1a70c776744702d3442aa9ffab2d480cc5d6f78a444d74ed3b6eac0407f6b571ddd02e63058d5386aae4

  • SSDEEP

    24576:VUFFAjGxqL+VD3crlj8XR2GN19yK9fbxjSXIQ8j0b4qsfQ9Mrm94+CJWMD/NXChu:NKUo3klIXhNryuI2j0sVf9

Malware Config

Extracted

Family

darkgate

Botnet

x6x6x7x77xx6x6x67

C2

dr-networks.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    rbQZFzKA

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    x6x6x7x77xx6x6x67

Targets

    • Target

      cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c

    • Size

      3.8MB

    • MD5

      b2d33941295f236bebee0d3c389a8549

    • SHA1

      76bfc480242219d14cfbbb8dd7628c3c9bde7f7d

    • SHA256

      cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c

    • SHA512

      c7a8a877a93590876221c9bf0c21e04b78a8a8af415c1a70c776744702d3442aa9ffab2d480cc5d6f78a444d74ed3b6eac0407f6b571ddd02e63058d5386aae4

    • SSDEEP

      24576:VUFFAjGxqL+VD3crlj8XR2GN19yK9fbxjSXIQ8j0b4qsfQ9Mrm94+CJWMD/NXChu:NKUo3klIXhNryuI2j0sVf9

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Enterprise v15

Tasks