General

  • Target

    2944-126-0x00000000031E0000-0x00000000035A3000-memory.dmp

  • Size

    3.8MB

  • Sample

    231011-nljvradh44

  • MD5

    46979a0acc102c5396c0d52c24fed72d

  • SHA1

    00d89f6b7dc77b19d27f37517e398e286db53cfb

  • SHA256

    5e587a8b89d523b846708785f8ff185f6920faa1917969233cca97ee9ae51b5a

  • SHA512

    d39ab51fd340ef90f7269ade1f39ba41a5d9c7e4e3e28bced85e63a0ef1da50799f602b4668518b604d41a30f1282ea714f7de5231ef845e5fcb4329ef158b9d

  • SSDEEP

    24576:bbZ7gWXU79TBNE118Yz8EQ9x3454Ax+ul+:b9OznUQ9x345AH

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

AA11

C2

http://94.228.169.143

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    bABouSDRyBocvj

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    AA11

Targets

    Tasks