General

  • Target

    2828-110-0x0000000003580000-0x0000000003715000-memory.dmp

  • Size

    1.6MB

  • Sample

    231113-qccq7acg5z

  • MD5

    879a5a6c1fe51023722835eb366315e4

  • SHA1

    7f7cccb47b41d7d5e63dc123d9d3345194d10cf0

  • SHA256

    079ce714ecd070802ee3117088d904f4d84721a4058c21747d5bd7dc6ee381f5

  • SHA512

    eeb24666fb03c7b088a4ffbee12f518aa4b25f5c5a07d577a69cef53d16b2268d8de8fa751c11f895a8dae9267054e0766e7b7de9f20d8a89286e735f84ba793

  • SSDEEP

    6144:3tr9fX7WqHWfHe1+8xzzlAjoOke92k55/5LwfIeejgoSxNj:9rFX7WlHe1+8xzIsk5x5sfIfrSf

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://8sjimonstersboonkonline.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    RndioOljcBmadZ

  • internal_mutex

    txtMut

  • minimum_disk

    42

  • minimum_ram

    6001

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    Tasks