General

  • Target

    4352-63-0x0000000003F10000-0x000000000423A000-memory.dmp

  • Size

    3.2MB

  • MD5

    e53254c3edfa3ff9418f83639fcbb7a5

  • SHA1

    c969a28345e4f7c5d85ca88cdd385ac614e27bd1

  • SHA256

    36fd9131e0d79b6d7eccd3b25d9a9289365b7df8724e9267331af36bb979894b

  • SHA512

    7591a8b1bcc4749e3c94e24b2ccffebc058c4966ad8a8050a3adf5edb677fac1b7d59b8576d14ab95a0ab55299f5f27ce567722d73192cfb1461f8a4fc59f1d1

  • SSDEEP

    12288:paxWdWX/VvnEZk/ZzOSwFBwoAWl87Egi+l2uy6ROofg:phdWX9vnEZk/ZHTUupTg

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://showmoreresultonliner.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    DDfcMjFaEKfNOW

  • internal_mutex

    txtMut

  • minimum_disk

    60

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Signatures

  • Darkgate family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4352-63-0x0000000003F10000-0x000000000423A000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections