General
-
Target
288-12-0x0000000003250000-0x00000000035D8000-memory.dmp
-
Size
3.5MB
-
Sample
240611-yav4rayfkj
-
MD5
35dfef256e9bb462e056d7ec89fafa6c
-
SHA1
17badb26d9b0a99f58f72e1877c56332c3b6f3ee
-
SHA256
fe5bfcf7f9e87e818d028dd14cc85ed5996289bdafeb599ae004dd70c9118a26
-
SHA512
e90ff74055b30816f734da517d81c7d304acd9570c16638b13c6bebf13c420c2f023dd0d80317c8cea46f36c9ae8cba0550c5c0eb871197e7144974408df3b53
-
SSDEEP
6144:7sO/bfNcGZ6tlmPHOUQDbafeajuw5Bvmr8oauNW4o63f7rwh8NYGQB:7N/bfhZ6fmNQDboeWl4xTrwh
Score
10/10
Malware Config
Extracted
Family
darkgate
Botnet
x6x6x7x77xx6x6x67
C2
dr-networks.com
Attributes
-
anti_analysis
true
-
anti_debug
false
-
anti_vm
true
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_raw_stub
false
-
internal_mutex
rbQZFzKA
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
6
-
rootkit
false
-
startup_persistence
true
-
username
x6x6x7x77xx6x6x67