DarkGate
MITRE
Tipo Malware:
Other
Other
Prima attivita:
Unknown
Unknown
Ultima attivita:
Unknown
Unknown
Dettagli:
[DarkGate](https://attack.mitre.org/software/S1111) first emerged in 2018 and has evolved into an initial access and data gathering tool associated with various criminal cyber operations. Written in Delphi and named "DarkGate" by its author, [DarkGate](https://attack.mitre.org/software/S1111) is associated with credential theft, cryptomining, cryptotheft, and pre-ransomware actions.(Citation: Ensilo Darkgate 2018) DarkGate use increased significantly starting in 2022 and is under active development by its author, who provides it as a Malware-as-a-Service offering.(Citation: Trellix Darkgate 2023)
Tecniche Associate (58)
| ID | ATT&CK | Tattiche |
|---|---|---|
| T1001 | Data Obfuscation | - |
| T1005 | Data from Local System | - |
| T1010 | Application Window Discovery | - |
| T1027 | Obfuscated Files or Information | - |
| T1027.013 | Encrypted/Encoded File | - |
| T1036 | Masquerading | - |
| T1036.003 | Rename Legitimate Utilities | - |
| T1036.007 | Double File Extension | - |
| T1041 | Exfiltration Over C2 Channel | - |
| T1047 | Windows Management Instrumentation | - |
| T1055.012 | Process Hollowing | - |
| T1056.001 | Keylogging | - |
| T1057 | Process Discovery | - |
| T1059.001 | PowerShell | - |
| T1059.003 | Windows Command Shell | - |
Metadata
| ID: | 322 |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |