General

  • Target

    4992-14-0x0000000004100000-0x00000000044C3000-memory.dmp

  • Size

    3.8MB

  • Sample

    231009-qq8qsadb21

  • MD5

    c9df0479d918b82aed67fc2e44dba8a6

  • SHA1

    0996c38db2f715d51ca66dfb74c2a5010ffcfcfe

  • SHA256

    eeb092c5b938c6f9b25e3fc8284758ab689be4c6fee72afa1d57c0783ee704ed

  • SHA512

    3483659f658c92790e24900121187ff6697461313cfcbb892dafa960ee7eb0df2df04b8464850e6b877cb9e1c9295381ec7eba7db35751ae5b9b0168156d990f

  • SSDEEP

    12288:crqZ/WvOI9jNqB4otUzD3X9SXqeeyTyg30sdukqnuh/kJC:cu/WWI/qSotUDH9SXPXOg39duk+uxc

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

A1111

C2

http://getldrrgoodgame.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    eYCqpouVyqrXSL

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    A1111

Targets

    Tasks