General

  • Target

    1324-34-0x00000000046D0000-0x00000000049FA000-memory.dmp

  • Size

    3.2MB

  • MD5

    0e24988eb6cd4cb330b61e67001b7bdb

  • SHA1

    3e774a7ddc54a63dc0d5acfc2d417a41f719a65f

  • SHA256

    d4888df61cb75dc346ed0f5a8bfa33751b6df22671a2713e1e8a23f1beff044d

  • SHA512

    cbdd890a803676955cbe587818a41d90199fee0a03135dcfcd5256b3803f8671a3382f37c0f01bbe8a60228cde0cdf628b2a378ef4d67668ee0d519f82cb7a48

  • SSDEEP

    6144:DFxPpLWmpkbZswJ1MZLBL9rLtmhQzRSd8zfT+Ka8tclomEH:RxPpLWF1MZLBL9H5I6zfyKxtclw

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://showmoreresultonliner.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    DDfcMjFaEKfNOW

  • internal_mutex

    txtMut

  • minimum_disk

    60

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Signatures

  • Darkgate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1324-34-0x00000000046D0000-0x00000000049FA000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections