General
-
Target
2776-33-0x0000000004470000-0x000000000479A000-memory.dmp
-
Size
3.2MB
-
Sample
231103-yzm5fabh34
-
MD5
7843af4f815d6884f059f33a2714e97f
-
SHA1
ae2df297352d171be8f866c274fc7b0ca994f826
-
SHA256
f546971b44853de46e3c5b6b18480e7a84784aca8a765e5f88e35fe57e9cca06
-
SHA512
8eddae1a2a2e309502b4d85b461af8d13483c23ff00738254aba709b4c38777bec8f65c03663383c376385917fb518152c8778ed830ac654e989ff7670bf3c99
-
SSDEEP
6144:rFnvHXWSxmk8pGl0+1xFlchi/72oZp6+EQfa/vmmEH:ZnvHXWE8pGlZ1xF56oZM+Tfa/vy
Behavioral task
behavioral1
Sample
2776-33-0x0000000004470000-0x000000000479A000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2776-33-0x0000000004470000-0x000000000479A000-memory.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
darkgate
user_871236672
http://showmoreresultonliner.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
DDfcMjFaEKfNOW
-
internal_mutex
txtMut
-
minimum_disk
60
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Targets
-
-
Target
2776-33-0x0000000004470000-0x000000000479A000-memory.dmp
-
Size
3.2MB
-
MD5
7843af4f815d6884f059f33a2714e97f
-
SHA1
ae2df297352d171be8f866c274fc7b0ca994f826
-
SHA256
f546971b44853de46e3c5b6b18480e7a84784aca8a765e5f88e35fe57e9cca06
-
SHA512
8eddae1a2a2e309502b4d85b461af8d13483c23ff00738254aba709b4c38777bec8f65c03663383c376385917fb518152c8778ed830ac654e989ff7670bf3c99
-
SSDEEP
6144:rFnvHXWSxmk8pGl0+1xFlchi/72oZp6+EQfa/vmmEH:ZnvHXWE8pGlZ1xF56oZM+Tfa/vy
Score1/10 -