General

  • Target

    624-39-0x00000000048C0000-0x0000000004C47000-memory.dmp

  • Size

    3.5MB

  • Sample

    240515-k8bk4saf41

  • MD5

    77adfbd169586974c046d6fb58ef4dcd

  • SHA1

    d00280ef0e885f2b52f49617928336c4fda36727

  • SHA256

    9d56c1e5a1d730822fcb863807b2cd79539b09799321d101d50eb961b444148f

  • SHA512

    d3d21275bf618aff73b833623e67f0f3e64fd80dca36506ac66220f54d69412cf94798263963862afb72492ea26622c7d6fb77f30c60e90debb848356dc0727b

  • SSDEEP

    6144:gmFFYrx0PmfUH1YTCh+mlrDvWBaoakAI04Yd1FkMGS4GQBe:lFFYrkmfUVY8+mp3I0/ZkMnz

Score
10/10

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

flexiblemaria.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    rZyBgHHD

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Targets

    • Target

      624-39-0x00000000048C0000-0x0000000004C47000-memory.dmp

    • Size

      3.5MB

    • MD5

      77adfbd169586974c046d6fb58ef4dcd

    • SHA1

      d00280ef0e885f2b52f49617928336c4fda36727

    • SHA256

      9d56c1e5a1d730822fcb863807b2cd79539b09799321d101d50eb961b444148f

    • SHA512

      d3d21275bf618aff73b833623e67f0f3e64fd80dca36506ac66220f54d69412cf94798263963862afb72492ea26622c7d6fb77f30c60e90debb848356dc0727b

    • SSDEEP

      6144:gmFFYrx0PmfUH1YTCh+mlrDvWBaoakAI04Yd1FkMGS4GQBe:lFFYrkmfUVY8+mp3I0/ZkMnz

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks