General

  • Target

    1904-14-0x00000000040E0000-0x00000000044A3000-memory.dmp

  • Size

    3.8MB

  • MD5

    6679870679142988e16a721debb7410a

  • SHA1

    a52fd0f785f9953b05d9975af605dd8d761336fe

  • SHA256

    18740a1b9fa6e31ac04a889abac397b66208a59acaf169d641b07ecdc006bd40

  • SHA512

    073dc98bd2e2c9c21430f9d47862975ce0a72fdc36dfd753f742c48d0fd413b361c596b4ea495e97908c5fdf8437ecabc523c9bd69c632fd4787f7fd83fd6b45

  • SSDEEP

    12288:S1QvVWb0UTj70e7BWBM51XtpO1E50kk/oMCK7CyQqnuR/49JC:S0VWQUr0etWBmHk1RnwMd7CF+uB8

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

vntricker

C2

http://66.42.63.27

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    SGPtPijuhviKpb

  • internal_mutex

    dBcFaE

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    vntricker

Signatures

Files

  • 1904-14-0x00000000040E0000-0x00000000044A3000-memory.dmp