General

  • Target

    f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51

  • Size

    2.5MB

  • Sample

    240808-qghs1axena

  • MD5

    353302ef3297119ad7e15d131b85c04d

  • SHA1

    c9140fc33bd499732feebc03ea4d3588675ae10f

  • SHA256

    f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51

  • SHA512

    3a1204eabe37dceb617049f8b2b9a2820b284d6861842791afb942198deecb47364084d66ca1a61c55fa934c9c3bd7e60517ee0928824e6246e8b1a2688df2c2

  • SSDEEP

    49152:T5i/25VXSPWNUaMgbiIctKyn4YGcvqiykXvyZeyXpdpffa:T5i/aNSEbVvm4YBvPKZeMd

Malware Config

Extracted

Family

darkgate

Botnet

Silhouette0

C2

wuauserv.site

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    pJdkDQxC

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    Silhouette0

Targets

    • Target

      f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51

    • Size

      2.5MB

    • MD5

      353302ef3297119ad7e15d131b85c04d

    • SHA1

      c9140fc33bd499732feebc03ea4d3588675ae10f

    • SHA256

      f2c0f9d4b21cd172b45971f9c32ab1d69d4e105e62e3dfc1407d543242008e51

    • SHA512

      3a1204eabe37dceb617049f8b2b9a2820b284d6861842791afb942198deecb47364084d66ca1a61c55fa934c9c3bd7e60517ee0928824e6246e8b1a2688df2c2

    • SSDEEP

      49152:T5i/25VXSPWNUaMgbiIctKyn4YGcvqiykXvyZeyXpdpffa:T5i/aNSEbVvm4YBvPKZeMd

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks