General

  • Target

    SystemSync.exe

  • Size

    2.2MB

  • Sample

    241210-mljdjstkdw

  • MD5

    3e9c3cc6b0f1e8e8724377eb82909ff8

  • SHA1

    313b0effb543efa6264e57fb5b6a2a048c57708d

  • SHA256

    71d381c6bb60a155304bfc532f53caef17de842fbeee76c66def4a47f299fa92

  • SHA512

    c87291bbb6916ed3ae4084302405b7e2a83432260502f599563644c3485010ed6977e5544468b933afee25ba8b09427f69e660c0c9085f7aa7e0b4b0bfdebd0c

  • SSDEEP

    49152:6EcPUz0VuTpPc4JrA5aR3UD9Cc/rENUwwiw4jm59J92mbd4H57+dIxEZVKzr71:N0VQP1JrA5+l+92mbOH5zKg

Malware Config

Extracted

Family

darkgate

Botnet

drk3

C2

todayput.shop

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    sEhfQzVh

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    drk3

Targets

    • Target

      SystemSync.exe

    • Size

      2.2MB

    • MD5

      3e9c3cc6b0f1e8e8724377eb82909ff8

    • SHA1

      313b0effb543efa6264e57fb5b6a2a048c57708d

    • SHA256

      71d381c6bb60a155304bfc532f53caef17de842fbeee76c66def4a47f299fa92

    • SHA512

      c87291bbb6916ed3ae4084302405b7e2a83432260502f599563644c3485010ed6977e5544468b933afee25ba8b09427f69e660c0c9085f7aa7e0b4b0bfdebd0c

    • SSDEEP

      49152:6EcPUz0VuTpPc4JrA5aR3UD9Cc/rENUwwiw4jm59J92mbd4H57+dIxEZVKzr71:N0VQP1JrA5+l+92mbOH5zKg

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Darkgate family

    • Detect DarkGate stealer

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Enterprise v15

Tasks