General

  • Target

    efad7bbcc8ba602d71d3c5ef68d7bcaa7c090dbfff70d3dc64e88131129ccb0aN

  • Size

    3.3MB

  • Sample

    241001-jp31kssepd

  • MD5

    088d7c739e2729e94cda31141de18dd0

  • SHA1

    57b422fb79d059b1ab6470f5e0834b9cef9d866d

  • SHA256

    efad7bbcc8ba602d71d3c5ef68d7bcaa7c090dbfff70d3dc64e88131129ccb0a

  • SHA512

    050dcade901a9c63551b2255a93f47fd8498821fb292bcdc2ded3f8df04a32764bbd6ea02f40e4549624a4f4d25c97be866da294904e088f240e63e220973c75

  • SSDEEP

    49152:oLqZ1Hof2s58TB9zh/4AbY04pQXnNfHHEHGVV9Oa8td8aQdUKzgvMRnU:oOZ1FTBph/4AbXNOxrQdueU

Malware Config

Extracted

Family

darkgate

Botnet

2zkrp

C2

91.222.173.223

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    vVoKjiXd

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    2zkrp

Targets

    • Target

      efad7bbcc8ba602d71d3c5ef68d7bcaa7c090dbfff70d3dc64e88131129ccb0aN

    • Size

      3.3MB

    • MD5

      088d7c739e2729e94cda31141de18dd0

    • SHA1

      57b422fb79d059b1ab6470f5e0834b9cef9d866d

    • SHA256

      efad7bbcc8ba602d71d3c5ef68d7bcaa7c090dbfff70d3dc64e88131129ccb0a

    • SHA512

      050dcade901a9c63551b2255a93f47fd8498821fb292bcdc2ded3f8df04a32764bbd6ea02f40e4549624a4f4d25c97be866da294904e088f240e63e220973c75

    • SSDEEP

      49152:oLqZ1Hof2s58TB9zh/4AbY04pQXnNfHHEHGVV9Oa8td8aQdUKzgvMRnU:oOZ1FTBph/4AbXNOxrQdueU

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Enterprise v15

Tasks