General

  • Target

    1716-71-0x0000000000400000-0x00000000007E4000-memory.dmp

  • Size

    3.9MB

  • MD5

    438e997f1df12a61d514eab369287cf0

  • SHA1

    466a920120202c911c73935386dc8ba7191e0cc4

  • SHA256

    23ee76d2a00564a769a33f06771cea34167dd5eb2fb2f32eca7a533d1c95c0d1

  • SHA512

    0d2672054b014be8190c51157b625cdc73926ef9cdb87c82807c94da01d57d9f4d4bf026bf16bcaa29b7cb54fbe0afd196112f45a6da2422b6b34aa10b48777d

  • SSDEEP

    98304:N77Pmq33rE/JDLPWZADUGer7B6iY74M/7mlwXVZ:p+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

grtgrnmwljenf.con-ip.com:1880

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1716-71-0x0000000000400000-0x00000000007E4000-memory.dmp
    .exe windows x86


    Headers

    Sections