General

  • Target

    c4d82f8a16231351b6b38481721adf252db2b875bd3e01ec64b60564ccbca5dc

  • Size

    1.4MB

  • Sample

    240806-y7ywxatarc

  • MD5

    13e143755f75724c462c46dadaa565d1

  • SHA1

    e5d510d76ad305be66edc4b21d4c077b054d8f20

  • SHA256

    c4d82f8a16231351b6b38481721adf252db2b875bd3e01ec64b60564ccbca5dc

  • SHA512

    6d479300bb9649f7cb9bc80f4d7a3415063f893888c37aadf7d8a0c958950246df1d84aa5b61a9ece77b54b77542e559b22517c8b4017ec26e3ac80a21ccfb33

  • SSDEEP

    24576:1/acGVm+490NfA+MEn11GVErLttr9U8rAInYGzB/XnZiUXYnYy55Zz:1/a7ZbBAcj3rLtLRAInJPZpYnYgZz

Malware Config

Extracted

Family

darkgate

Botnet

Gh0st

C2

filetmoon.site

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    KaVpLvWD

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    Gh0st

Targets

    • Target

      48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939

    • Size

      2.1MB

    • MD5

      fc99ddf185aa553bf30c431cc897c903

    • SHA1

      72c3ae0ed953a4ed3a5d1d8e3957f530c952f48d

    • SHA256

      48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939

    • SHA512

      0be1916e9f0fa3ff2282bbfc23ac9c5f19c15c17f5e0e6aa68edea3db7b780c53f473d40292f0ed324596996572917dfe584cc2d989773c77ee489b643dd2e46

    • SSDEEP

      49152:Uk8BMMcyO6uzNJbIdNJbnwppkcWAta0PH1i:HasZ6uJJb6UJNa0

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks