General

  • Target

    2760-16-0x0000000004AD0000-0x0000000004E93000-memory.dmp

  • Size

    3.8MB

  • MD5

    db442eded311d97f6e3f5d12e4c24c44

  • SHA1

    687b73f2ea021da6f785422b0838284f8d809eae

  • SHA256

    be033ba69dcadbd2cef131076eddb6332d5b3ad954a9660f597b1c56e79aa49e

  • SHA512

    4693df5c5527ce386cd9885c80c0463109b068f77993a58987ade3690da1484026ba701d44a0a3a4a01d6a4827d2e9851c99acf0099d748ba2e1ceae1d7bbb31

  • SSDEEP

    24576:FJmW+QKlzp4TpLb3xgSgffSskgsS+ulF:FJijYgffSHR0

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

AA11

C2

http://94.228.169.123

http://178.236.247.73

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    nxnjYDThgzyWBp

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    AA11

Signatures

Files

  • 2760-16-0x0000000004AD0000-0x0000000004E93000-memory.dmp