General

  • Target

    4712-14-0x0000000004420000-0x00000000047E3000-memory.dmp

  • Size

    3.8MB

  • MD5

    5cbcd50ddd09f92461388e8807ba9295

  • SHA1

    3b60568007f846aa5c394eca6f9dbc0641a061fe

  • SHA256

    d2251bd45079ea25716b7d63066d1d7ec611e045b3d3d72075cac2f0bf40fa4e

  • SHA512

    e927a233e04481718c98d1948730819eb6e4b0ed86238769caa4683bd68e4ad24bb416aab0f2e8d5b43c2d02ba8dd8c78ea0256a4d792d796a49ab7abd41b5fe

  • SSDEEP

    24576:mYZW+bkbACSpK79BsRdPMMtmpBkHyd+up0:mY1YydPMM9DR

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

AA11

C2

http://94.228.169.143

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    QftsbpyrJeATQI

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    AA11

Signatures

Files

  • 4712-14-0x0000000004420000-0x00000000047E3000-memory.dmp