General

  • Target

    5dbc3e721cd340dd80bfa7d0127d920f5f2630aa4b3b3ecfb8d2af9f28f0e208.exe

  • Size

    3.9MB

  • Sample

    240828-b56sea1gln

  • MD5

    0220e55e567338d2ff26878a3a4ac252

  • SHA1

    2d2e853e5221314208066e2c34993afabd884e63

  • SHA256

    5dbc3e721cd340dd80bfa7d0127d920f5f2630aa4b3b3ecfb8d2af9f28f0e208

  • SHA512

    1963c455efed002b775e00fd0f226613a9b7ff90275e226e66888ae56adfbf248ac46eec1e57537b2a8a86e7dac2aabf0c26b7b7d245dae4a116c8f6f44c28b6

  • SSDEEP

    49152:OR/KpmZub9f2S8W2ILeWl+C1p9jWy5Snd0eigXJCkF1dnJbMeVJoXxBatJFVUXYq:Y/jTYLP1Sy5E0Be10eVJwBwVaTcY

Malware Config

Extracted

Family

darkgate

Botnet

x88y8y

C2

91.222.173.42

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    hFPyhiRz

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    x88y8y

Targets

    • Target

      5dbc3e721cd340dd80bfa7d0127d920f5f2630aa4b3b3ecfb8d2af9f28f0e208.exe

    • Size

      3.9MB

    • MD5

      0220e55e567338d2ff26878a3a4ac252

    • SHA1

      2d2e853e5221314208066e2c34993afabd884e63

    • SHA256

      5dbc3e721cd340dd80bfa7d0127d920f5f2630aa4b3b3ecfb8d2af9f28f0e208

    • SHA512

      1963c455efed002b775e00fd0f226613a9b7ff90275e226e66888ae56adfbf248ac46eec1e57537b2a8a86e7dac2aabf0c26b7b7d245dae4a116c8f6f44c28b6

    • SSDEEP

      49152:OR/KpmZub9f2S8W2ILeWl+C1p9jWy5Snd0eigXJCkF1dnJbMeVJoXxBatJFVUXYq:Y/jTYLP1Sy5E0Be10eVJwBwVaTcY

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Enterprise v15

Tasks