General
-
Target
2540-12-0x0000000002F90000-0x0000000003125000-memory.dmp
-
Size
1.6MB
-
Sample
231201-g6s6lafd96
-
MD5
2bedf186cdde3d32b9d2bcc8a4831d4e
-
SHA1
d9bf0a08e144e376b334c8b512fbcb05624ec9ff
-
SHA256
f598945b6e44b4cc5fb1ea1a64fd13f964034354c3d2f7a33d6d5a0fa97337bc
-
SHA512
aa7781a4a4ea272e6729ebf992d630314b8e1cb82327ef88d3a7963f1bb5883bcaabbd150983ef899bad91bf32f191490393cf5a5a5043dd0cf25be2b074ace7
-
SSDEEP
6144:VNj6lUg2UiuUfW5lZpmPKMW9cqZl1pNrk8qOgumr4:/j6lUYiuUfWTZpsgnxrxqOgumc
Malware Config
Extracted
Family
darkgate
Botnet
A11111
C2
http://trans1ategooglecom.com
http://saintelzearlava.com
Attributes
-
alternative_c2_port
8080
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
XiOwgXyDLNDEpj
-
internal_mutex
txtMut
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
A11111