General

  • Target

    2540-12-0x0000000002F90000-0x0000000003125000-memory.dmp

  • Size

    1.6MB

  • Sample

    231201-g6tgcsfd97

  • MD5

    2bedf186cdde3d32b9d2bcc8a4831d4e

  • SHA1

    d9bf0a08e144e376b334c8b512fbcb05624ec9ff

  • SHA256

    f598945b6e44b4cc5fb1ea1a64fd13f964034354c3d2f7a33d6d5a0fa97337bc

  • SHA512

    aa7781a4a4ea272e6729ebf992d630314b8e1cb82327ef88d3a7963f1bb5883bcaabbd150983ef899bad91bf32f191490393cf5a5a5043dd0cf25be2b074ace7

  • SSDEEP

    6144:VNj6lUg2UiuUfW5lZpmPKMW9cqZl1pNrk8qOgumr4:/j6lUYiuUfWTZpsgnxrxqOgumc

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

A11111

C2

http://trans1ategooglecom.com

http://saintelzearlava.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    XiOwgXyDLNDEpj

  • internal_mutex

    txtMut

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    A11111

Targets

    Tasks