General
-
Target
1904-14-0x00000000040E0000-0x00000000044A3000-memory.dmp
-
Size
3.8MB
-
MD5
6679870679142988e16a721debb7410a
-
SHA1
a52fd0f785f9953b05d9975af605dd8d761336fe
-
SHA256
18740a1b9fa6e31ac04a889abac397b66208a59acaf169d641b07ecdc006bd40
-
SHA512
073dc98bd2e2c9c21430f9d47862975ce0a72fdc36dfd753f742c48d0fd413b361c596b4ea495e97908c5fdf8437ecabc523c9bd69c632fd4787f7fd83fd6b45
-
SSDEEP
12288:S1QvVWb0UTj70e7BWBM51XtpO1E50kk/oMCK7CyQqnuR/49JC:S0VWQUr0etWBmHk1RnwMd7CF+uB8
Malware Config
Extracted
Family
darkgate
Botnet
vntricker
C2
http://66.42.63.27
Attributes
-
alternative_c2_port
8080
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
2351
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
SGPtPijuhviKpb
-
internal_mutex
dBcFaE
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
vntricker
Signatures
-
Darkgate family
Files
-
1904-14-0x00000000040E0000-0x00000000044A3000-memory.dmp