General

  • Target

    7e18e5fe9e980c48ad67cc2ce7423e818e15c1256e2ffe4ce85c5cfbd5b30877.exe

  • Size

    3.9MB

  • Sample

    240827-vvzqws1gpg

  • MD5

    ad57c10c22e2ab26df6368f68b90a4c6

  • SHA1

    6e0ad14c30b11cd4edb8a1c55f7b371f0835e9f2

  • SHA256

    7e18e5fe9e980c48ad67cc2ce7423e818e15c1256e2ffe4ce85c5cfbd5b30877

  • SHA512

    a37e1cb8287c5f18ca77a39c47409df73e92c45fa5ca3734be1f5f2bb2c814b9c012fd7223adef1a9d1ba0a97ab849704fc3e4e1ded2a813a4c813fdb15a0e91

  • SSDEEP

    49152:NR/KpmZubPf2S8W2ILeWl+C1p9jWy5Snv0eigXmBFS+Dqt1fZWF40Xam6d+OdzPH:z/jtYLP1Sy5S0T09zfZ6VqtPv

Malware Config

Extracted

Family

darkgate

Botnet

2zkrp

C2

45.11.59.161

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    OoBWzohU

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    2zkrp

Targets

    • Target

      7e18e5fe9e980c48ad67cc2ce7423e818e15c1256e2ffe4ce85c5cfbd5b30877.exe

    • Size

      3.9MB

    • MD5

      ad57c10c22e2ab26df6368f68b90a4c6

    • SHA1

      6e0ad14c30b11cd4edb8a1c55f7b371f0835e9f2

    • SHA256

      7e18e5fe9e980c48ad67cc2ce7423e818e15c1256e2ffe4ce85c5cfbd5b30877

    • SHA512

      a37e1cb8287c5f18ca77a39c47409df73e92c45fa5ca3734be1f5f2bb2c814b9c012fd7223adef1a9d1ba0a97ab849704fc3e4e1ded2a813a4c813fdb15a0e91

    • SSDEEP

      49152:NR/KpmZubPf2S8W2ILeWl+C1p9jWy5Snv0eigXmBFS+Dqt1fZWF40Xam6d+OdzPH:z/jtYLP1Sy5S0T09zfZ6VqtPv

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Enterprise v15

Tasks