General
-
Target
2192-42-0x0000000002820000-0x0000000002893000-memory.dmp
-
Size
460KB
-
Sample
240402-tmng8afb25
-
MD5
5fd00285d57ca15a88d0454809f7243d
-
SHA1
2e1ffbb22b9daab2f3393b58a6421c4be96ce38f
-
SHA256
48dcf874f7c6103f893f838b9e113cfd0a9e4aa13312be975729d97133c63f21
-
SHA512
25432db9a3dceb552c449d3080f7a60eedfcd172f9b61c93ff5fc509d2ba89d92e6fc92587af0cdbc8903397338677fefb9658430a78bda90639b872c7d6328f
-
SSDEEP
6144:bN6BaVyAPgQDONxE5LZCvubT7AAoQDhviJOoalPTyEyp5hQ9UydWL4pWL:4syGSNxE5L4mbT7AAoU/yBVQ9RdIWWL
Behavioral task
behavioral1
Sample
2192-42-0x0000000002820000-0x0000000002893000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2192-42-0x0000000002820000-0x0000000002893000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
darkgate
admin888
31yc.com
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
xIpQnKfo
-
minimum_disk
50
-
minimum_ram
4000
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
admin888
Targets
-
-
Target
2192-42-0x0000000002820000-0x0000000002893000-memory.dmp
-
Size
460KB
-
MD5
5fd00285d57ca15a88d0454809f7243d
-
SHA1
2e1ffbb22b9daab2f3393b58a6421c4be96ce38f
-
SHA256
48dcf874f7c6103f893f838b9e113cfd0a9e4aa13312be975729d97133c63f21
-
SHA512
25432db9a3dceb552c449d3080f7a60eedfcd172f9b61c93ff5fc509d2ba89d92e6fc92587af0cdbc8903397338677fefb9658430a78bda90639b872c7d6328f
-
SSDEEP
6144:bN6BaVyAPgQDONxE5LZCvubT7AAoQDhviJOoalPTyEyp5hQ9UydWL4pWL:4syGSNxE5L4mbT7AAoU/yBVQ9RdIWWL
Score1/10 -