General

  • Target

    800-14-0x00000000043E0000-0x00000000047A3000-memory.dmp

  • Size

    3.8MB

  • MD5

    0460bb02795d45a3678fe1f106b97895

  • SHA1

    20913f1986d74d5f02e489e3df404b68fac95571

  • SHA256

    cbaac18a55838c4412f63954fb6b5ed8d0aa486e5454f0173d4f8c9cabfaa406

  • SHA512

    81685408e3258caf0d9ca9e549d66a873391f4006af57197566156648ffb178050927aad88175df5de86b7e5355c424b060db609a0ce36a0a735245a8c50faa5

  • SSDEEP

    12288:CFAflWbkUDjrk6mBbIp1dklG5+00/4Mje6rCXglqnuR/HJC:CElWAUrk6mBWHklGAHAMjxrCXI+uBp

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

A1111

C2

http://getldrrgoodgame.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    eYCqpouVyqrXSL

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    A1111

Signatures

Files

  • 800-14-0x00000000043E0000-0x00000000047A3000-memory.dmp