General

  • Target

    288-12-0x0000000003250000-0x00000000035D8000-memory.dmp

  • Size

    3.5MB

  • Sample

    240611-yav4rayfkj

  • MD5

    35dfef256e9bb462e056d7ec89fafa6c

  • SHA1

    17badb26d9b0a99f58f72e1877c56332c3b6f3ee

  • SHA256

    fe5bfcf7f9e87e818d028dd14cc85ed5996289bdafeb599ae004dd70c9118a26

  • SHA512

    e90ff74055b30816f734da517d81c7d304acd9570c16638b13c6bebf13c420c2f023dd0d80317c8cea46f36c9ae8cba0550c5c0eb871197e7144974408df3b53

  • SSDEEP

    6144:7sO/bfNcGZ6tlmPHOUQDbafeajuw5Bvmr8oauNW4o63f7rwh8NYGQB:7N/bfhZ6fmNQDboeWl4xTrwh

Malware Config

Extracted

Family

darkgate

Botnet

x6x6x7x77xx6x6x67

C2

dr-networks.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    rbQZFzKA

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    x6x6x7x77xx6x6x67

Targets

    Tasks