DarkGate Malware

    Date: 09/06/2024

    Severity: High

    Summary

    DarkGate is a comprehensive toolkit that equips attackers with extensive tools to fully compromise victim systems. As a loader and botnet malware, DarkGate has been in circulation since 2017.

    Indicators of Compromise (IOC) List

    Message / c2 communication

    zLAxuU0kQKf3sWE7ePRO2imyg9GSpVoYC6rhlX48ZHnvjJDBNFtMd1I5acwbqT+=

    Registry Keys and Path

    Software\Microsoft\Windows\CurrentVersion\Internet Settings

    — Key: ProxyEnable

    — Key: ProxyServer

    Process Creation 

    "/c c:\\temp\\PsExec.exe -accepteula -i"

    Hash

    1fb6b8bed3a67ee4225f852c3d90fd2b629f2541ab431b4bd4d9d9f5bbd2c4b7

    Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection

    Message / c2 communication

    resourceName = "Sysmon"  AND message like "zLAxuU0kQKf3sWE7ePRO2imyg9GSpVoYC6rhlX48ZHnvjJDBNFtMd1I5acwbqT+="

    Message / c2 communication

    technologygroup = "EDR"  AND message like "zLAxuU0kQKf3sWE7ePRO2imyg9GSpVoYC6rhlX48ZHnvjJDBNFtMd1I5acwbqT+=

    Registry Keys and Path

    (resourcename = "Windows Security"  AND eventtype = "4657"  ) AND objectname In ("Software\Microsoft\Windows\CurrentVersion\Internet Settings" , "ProxyEnable" , "ProxyServer")

    Registry Keys and Pathtechnologygroup = "EDR" AND objectname In ("Software\Microsoft\Windows\CurrentVersion\Internet Settings" , "ProxyEnable" , "ProxyServer")

    Process Creation

    (resourceName = "Windows Security"  AND eventtype = "4688"  ) AND commandline = "/c c:\\temp\\PsExec.exe -accepteula -i"

    Process Creationtechnologygroup = "EDR" AND commandline = "/c c:\\temp\\PsExec.exe -accepteula -i"

    Hash

    sha256hash IN ("1fb6b8bed3a67ee4225f852c3d90fd2b629f2541ab431b4bd4d9d9f5bbd2c4b7")

    Reference:

    https://gurucul.com/blog/darkgate-malware/


    Tags

    MalwareGurucul

    « Previous ArticleNext Article »

    Comments

    No records to display

    Looking for Something?
    Threat Research Categories:
    Tags