General

  • Target

    3692-14-0x0000000004600000-0x00000000049C3000-memory.dmp

  • Size

    3.8MB

  • Sample

    231010-19bv9sfb2x

  • MD5

    c6009f8382c2f2f45f14f8737a7389e3

  • SHA1

    ac510202ffab0857721b93f269b4d4bebfb52832

  • SHA256

    5c3820fe6ae491478a3a40600cf213bceac8c417160065b5ac704d81852c28cb

  • SHA512

    901d0a152005190ded5b8150f4e31256b4090a3243d107f96de81ec0d7c0b09a62d178a38f2d174cc5501d4d8dc62a0e512301b2efe1abac634888845ccebf15

  • SSDEEP

    24576:5C+vWGIfay4tkjcHfX+ANnt+Kai4dy+uRC:M+OufX+AN8X

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

AA11

C2

http://94.228.169.143

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    YZlHPyuiLOFTOL

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    AA11

Targets

    Tasks