General

  • Target

    996-97-0x0000000000400000-0x00000000007E4000-memory.dmp

  • Size

    3.9MB

  • MD5

    dbaccc83b8dd32e3144e2409aed6f62c

  • SHA1

    6caf36f2d21de9feb56715e1eed30c10539fcd5c

  • SHA256

    a1935cfe5e5e85b1eef65a6f1925c9a80c82c236296d45208cf256afe157062c

  • SHA512

    fe147ddd87ac80c8ee0f56a2d8fe5a7e620633266c7147650766a5c1555fdb85181a0e75943a41b42ce8f78240e5ea378da9416d40350c1e9ecd2a27737f8eb6

  • SSDEEP

    98304:S77Pmq33rE/JDLPWZADUGer7B6iY74M/zmlwXVZ+:U+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

stonecold.ddns.net:4812

Attributes
  • communication_password

    ac7b2a72c82f15c4898d6a8f05cab46b

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 996-97-0x0000000000400000-0x00000000007E4000-memory.dmp
    .exe windows x86


    Headers

    Sections