General

  • Target

    5e5611abfe988bec0e8f9fc012243add.bin

  • Size

    3.0MB

  • Sample

    240720-bqsbgazekj

  • MD5

    143e16b7de5260f92f2f46ffb9b941c0

  • SHA1

    0dcdd0cfeb381cfd6beab4c551de5d2aed268129

  • SHA256

    8fb0dc2dbab60012204f90d70f70a8b9bdca634438ac99037076d3ced9c2920e

  • SHA512

    85da9fd713d52fba136fdf7fea36dcf4fd8f4df03d20cff3c591dae01926cd1daec337e04a503d7f087c0ea143a06834e6073b8245b6a6a60781ecfeaebfbe2c

  • SSDEEP

    49152:ePyhtDOmQn2aFx6gfLcdU0+Fi+Or3dY3cfEFbnioV7VAhjDvIsv+2cgIwrd5:ePUtDBVi0+seyebioVqy5gnd5

Malware Config

Extracted

Family

darkgate

Botnet

trafikk897612561

C2

91.222.175.250

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    crrZYSEf

  • minimum_disk

    100

  • minimum_ram

    4095

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    trafikk897612561

Targets

    • Target

      ec61895ef8af01ff00970e46f7ba98c24bf9079d71e09d3c18576f1a9efc93c2.exe

    • Size

      7.9MB

    • MD5

      5e5611abfe988bec0e8f9fc012243add

    • SHA1

      8e28dd1b33a954dafc7d678b8e67c41cfe8bc0b7

    • SHA256

      ec61895ef8af01ff00970e46f7ba98c24bf9079d71e09d3c18576f1a9efc93c2

    • SHA512

      3d9636680d86bc918bded4882d5c717c698188104b7fdb1f28db67da29c95897bb0dc12d844cfe6b4e843f48b09e59c34edde4fb920aa67fbcc0794176794dc3

    • SSDEEP

      98304:r+oXX33dpwZDEVM1h5N2cnkk/J4Sf6Qq68:ya3LwZbh/Zyb

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Enterprise v15

Tasks