General

  • Target

    2040-125-0x0000000003230000-0x00000000035F3000-memory.dmp

  • Size

    3.8MB

  • Sample

    231011-nvv95seg26

  • MD5

    fcba28b2d55ddbed4d9fe4f6340fda45

  • SHA1

    b3d1340cde1f9a35a683e03db5587c3d9ffcbef5

  • SHA256

    c57a654d0d12923b6e7372c10531b3ff5c71f1e78cf479b64fa9b8ae5cfae853

  • SHA512

    d45010ee05c142a63a7b52245111716986693a5a99bb33ceaa7809f2a9c1ac6c10e59514fdddfa9bff2eecdd1593e369d24c360c1357b657452982cc859317dc

  • SSDEEP

    12288:ypevVWHuG3xTwjKSxEcYD5M9gsQSk2KekatWaqnu5/fJC:yiVWOG5wjKSxK1M9PZkzeftWa+u5x

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

AA11

C2

http://94.228.169.143

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    bABouSDRyBocvj

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    AA11

Targets

    Tasks