General

  • Target

    4256-14-0x0000000004DE0000-0x00000000051A3000-memory.dmp

  • Size

    3.8MB

  • Sample

    231006-wvss1seh9y

  • MD5

    b0701b7a71856f51930b2bdaac340aae

  • SHA1

    041f87fecb1781d7b6c1403bc5f6b28381ca95b8

  • SHA256

    b9b81b5aabbe815b69415c56ef51677caecaa5ea34b4eec2e883f46726b362ab

  • SHA512

    4cf6a47081ca048437976acf1e492051aa615282d33dbdcc003b69c655692e5212b9f2dc84cc760f49e8c2b786ff85c6a5ee3b9b7756c4eec93d0b5478f1f685

  • SSDEEP

    12288:ilg/FWbEBKjjLE6GEIs/j1t79kFU+UU/YMSaLCQqnuR/9JC:ikFWgBKrE6GEI2HkFhHgM9LCQ+uBf

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

usr_871663321

C2

http://searcherbigdealk.com

Attributes
  • alternative_c2_port

    443

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    ANzECjwvNOoJvc

  • internal_mutex

    txtMut

  • minimum_disk

    40

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    usr_871663321

Targets

    Tasks