General

  • Target

    2688-138-0x0000000000400000-0x00000000007E4000-memory.dmp

  • Size

    3.9MB

  • MD5

    ce2edea8f7421d65cb9644ac0ef6be40

  • SHA1

    5f30ff16209547f1dfe30581c658432aebc48cbc

  • SHA256

    25beb12eb3670879a7263f0145b235b90c8cc9a06d3bbde8b12ae911a198e56c

  • SHA512

    82e4a9fa5b3b46f5a70ec81adfd2f34c9747c9682f8c7e470ba4bf4bbe2260b98e6240ea8d52ea98ec47262f1c5afe61dc66432a2fd98654d7f0209f77404dba

  • SSDEEP

    98304:M77Pmq33rE/JDLPWZADUGer7B6iY74M/jmlwXVZ:a+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

62.210.55.136:3566

Attributes
  • communication_password

    3083202a936b7d0ef8b680d7ae73fa1a

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2688-138-0x0000000000400000-0x00000000007E4000-memory.dmp
    .exe windows x86


    Headers

    Sections