General

  • Target

    2156-14-0x00000000046C0000-0x0000000004A83000-memory.dmp

  • Size

    3.8MB

  • MD5

    9c4b53cfe6fe3529013107f6fdd31155

  • SHA1

    515ab630e4a6746229335cce37516f65545215e9

  • SHA256

    2f09297007d77b51389dad20338d0bd3d05cea7a2b6186cb0afe874f73ffb7ee

  • SHA512

    9e6cf1e64c4ec2a3c535b5d43b1fef55691959c814c49ed6573d0d34a41b8d2ff93ce3d1e5d205c1a791d4fe3eb47ec90cd9c8fb03b3b539b971004462125ccb

  • SSDEEP

    12288:IfO1rWPXygh7B+KsNkffb07u+qOLmIgYBmcqnuJ/LoJC:IKrWPigX+KsNAT07T/CItBmc+upc

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

vntricker

C2

http://66.42.63.27

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    jaXPPSfmauJgag

  • internal_mutex

    dBcFaE

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    vntricker

Signatures

Files

  • 2156-14-0x00000000046C0000-0x0000000004A83000-memory.dmp