General

  • Target

    9845e65543e74e6b6e731af9349d932c7b4e70ddf0a79d9e2fe18a10002e912f

  • Size

    4.7MB

  • Sample

    240818-bgj9hazdkj

  • MD5

    3d253352224aead7526d58a4e21932fb

  • SHA1

    ca2e53cf2ec7fc678c347198dbf1c6d76e32380b

  • SHA256

    9845e65543e74e6b6e731af9349d932c7b4e70ddf0a79d9e2fe18a10002e912f

  • SHA512

    516ff664fe2446df5793498f9daa565647c339fdc4423454fdc129b1fc43b6fe0b968600d00709c8f5e2dfe80a366858f67e148f40c9d85255d02bdae238d3a3

  • SSDEEP

    98304:fCsVbXGGHMUhn6kUC1h3TSx+Fn388qjYeQnV:asViQM

Malware Config

Extracted

Family

darkgate

Botnet

x6x6x7x77xx6x6x67

C2

australiaivf.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    eXesNlDE

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    x6x6x7x77xx6x6x67

Targets

    • Target

      9845e65543e74e6b6e731af9349d932c7b4e70ddf0a79d9e2fe18a10002e912f

    • Size

      4.7MB

    • MD5

      3d253352224aead7526d58a4e21932fb

    • SHA1

      ca2e53cf2ec7fc678c347198dbf1c6d76e32380b

    • SHA256

      9845e65543e74e6b6e731af9349d932c7b4e70ddf0a79d9e2fe18a10002e912f

    • SHA512

      516ff664fe2446df5793498f9daa565647c339fdc4423454fdc129b1fc43b6fe0b968600d00709c8f5e2dfe80a366858f67e148f40c9d85255d02bdae238d3a3

    • SSDEEP

      98304:fCsVbXGGHMUhn6kUC1h3TSx+Fn388qjYeQnV:asViQM

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Enterprise v15

Tasks