General

  • Target

    1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b

  • Size

    5.5MB

  • Sample

    240610-cwmtlsbd37

  • MD5

    4af2e6a8be2b1862e2e1fb834da6a927

  • SHA1

    cb01022fa8b4884e17cfc26b2320d166058c5e99

  • SHA256

    1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b

  • SHA512

    b174b4fb021930b2515236876e1145dd585c7a40949cd6647c0cb88e6efd20382926d6bbae686f5b0b94610c4b47e40293f4452d408ee34403a8093ffecc81ce

  • SSDEEP

    24576:RFVmFF1UBOW6UWaPXiWdLSvwboQyzcQWQatx50PcL+J0qTIPwPyUCZv9F8JissLs:7Dxww8uX2FjHCdl+hnCqimL47JAl

Malware Config

Extracted

Family

darkgate

Botnet

x6x6x7x77xx6x6x67

C2

dr-networks.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    swMFGADk

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    x6x6x7x77xx6x6x67

Targets

    • Target

      1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b

    • Size

      5.5MB

    • MD5

      4af2e6a8be2b1862e2e1fb834da6a927

    • SHA1

      cb01022fa8b4884e17cfc26b2320d166058c5e99

    • SHA256

      1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b

    • SHA512

      b174b4fb021930b2515236876e1145dd585c7a40949cd6647c0cb88e6efd20382926d6bbae686f5b0b94610c4b47e40293f4452d408ee34403a8093ffecc81ce

    • SSDEEP

      24576:RFVmFF1UBOW6UWaPXiWdLSvwboQyzcQWQatx50PcL+J0qTIPwPyUCZv9F8JissLs:7Dxww8uX2FjHCdl+hnCqimL47JAl

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Detect DarkGate stealer

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: AutoIT

      Using AutoIT for possible automate script.

MITRE ATT&CK Matrix

Tasks