General

  • Target

    2776-33-0x0000000004470000-0x000000000479A000-memory.dmp

  • Size

    3.2MB

  • MD5

    7843af4f815d6884f059f33a2714e97f

  • SHA1

    ae2df297352d171be8f866c274fc7b0ca994f826

  • SHA256

    f546971b44853de46e3c5b6b18480e7a84784aca8a765e5f88e35fe57e9cca06

  • SHA512

    8eddae1a2a2e309502b4d85b461af8d13483c23ff00738254aba709b4c38777bec8f65c03663383c376385917fb518152c8778ed830ac654e989ff7670bf3c99

  • SSDEEP

    6144:rFnvHXWSxmk8pGl0+1xFlchi/72oZp6+EQfa/vmmEH:ZnvHXWE8pGlZ1xF56oZM+Tfa/vy

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://showmoreresultonliner.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    DDfcMjFaEKfNOW

  • internal_mutex

    txtMut

  • minimum_disk

    60

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Signatures

  • Darkgate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2776-33-0x0000000004470000-0x000000000479A000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections