General
-
Target
4992-14-0x0000000004100000-0x00000000044C3000-memory.dmp
-
Size
3.8MB
-
Sample
231009-qq8qsadb21
-
MD5
c9df0479d918b82aed67fc2e44dba8a6
-
SHA1
0996c38db2f715d51ca66dfb74c2a5010ffcfcfe
-
SHA256
eeb092c5b938c6f9b25e3fc8284758ab689be4c6fee72afa1d57c0783ee704ed
-
SHA512
3483659f658c92790e24900121187ff6697461313cfcbb892dafa960ee7eb0df2df04b8464850e6b877cb9e1c9295381ec7eba7db35751ae5b9b0168156d990f
-
SSDEEP
12288:crqZ/WvOI9jNqB4otUzD3X9SXqeeyTyg30sdukqnuh/kJC:cu/WWI/qSotUDH9SXPXOg39duk+uxc
Malware Config
Extracted
Family
darkgate
Botnet
A1111
C2
http://getldrrgoodgame.com
Attributes
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
eYCqpouVyqrXSL
-
internal_mutex
txtMut
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
A1111