General

  • Target

    2684-148-0x00000000032D0000-0x0000000003693000-memory.dmp

  • Size

    3.8MB

  • MD5

    3157e11ef1bd4e857af36d4800cf3b97

  • SHA1

    c17be82ee8a2715104f1d0bf0de57bf4d6f2f577

  • SHA256

    d1819cd24e4108aeb136a5bd879f76f09409860660fd4c2b541723a64e02641c

  • SHA512

    961e3c8cacfad911bc48dd6babb926a191b66825cc920d52a883fd4c75bedebc451a5a6a7a2f004fd9e7600aeca75b942c235fdc81c76a60ac96c442ba142d46

  • SSDEEP

    12288:AnINfWHg65J1WjWcVED1rY7rSseElRyVaqMzmeqnuR/vJC:AEfWA6RWjWcVk1YftplyaTzme+uBh

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

AA11

C2

http://94.228.169.143

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    false

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    zNgEWggCEDfkev

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    AA11

Signatures

Files

  • 2684-148-0x00000000032D0000-0x0000000003693000-memory.dmp