General
-
Target
4352-63-0x0000000003F10000-0x000000000423A000-memory.dmp
-
Size
3.2MB
-
Sample
231112-k1p4jaed79
-
MD5
e53254c3edfa3ff9418f83639fcbb7a5
-
SHA1
c969a28345e4f7c5d85ca88cdd385ac614e27bd1
-
SHA256
36fd9131e0d79b6d7eccd3b25d9a9289365b7df8724e9267331af36bb979894b
-
SHA512
7591a8b1bcc4749e3c94e24b2ccffebc058c4966ad8a8050a3adf5edb677fac1b7d59b8576d14ab95a0ab55299f5f27ce567722d73192cfb1461f8a4fc59f1d1
-
SSDEEP
12288:paxWdWX/VvnEZk/ZzOSwFBwoAWl87Egi+l2uy6ROofg:phdWX9vnEZk/ZHTUupTg
Behavioral task
behavioral1
Sample
4352-63-0x0000000003F10000-0x000000000423A000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
4352-63-0x0000000003F10000-0x000000000423A000-memory.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
darkgate
user_871236672
http://showmoreresultonliner.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
DDfcMjFaEKfNOW
-
internal_mutex
txtMut
-
minimum_disk
60
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Targets
-
-
Target
4352-63-0x0000000003F10000-0x000000000423A000-memory.dmp
-
Size
3.2MB
-
MD5
e53254c3edfa3ff9418f83639fcbb7a5
-
SHA1
c969a28345e4f7c5d85ca88cdd385ac614e27bd1
-
SHA256
36fd9131e0d79b6d7eccd3b25d9a9289365b7df8724e9267331af36bb979894b
-
SHA512
7591a8b1bcc4749e3c94e24b2ccffebc058c4966ad8a8050a3adf5edb677fac1b7d59b8576d14ab95a0ab55299f5f27ce567722d73192cfb1461f8a4fc59f1d1
-
SSDEEP
12288:paxWdWX/VvnEZk/ZzOSwFBwoAWl87Egi+l2uy6ROofg:phdWX9vnEZk/ZHTUupTg
Score1/10 -