General

  • Target

    736-359-0x0000000010440000-0x0000000010824000-memory.dmp

  • Size

    3.9MB

  • MD5

    3ee031945b0ac311e3a2a59c9c95a172

  • SHA1

    e649cb42e1b1e3cc680a139b34ef1da0f79e4727

  • SHA256

    16148fc8674bf0d3729af9bd150ac961a099157a52229b8eb743c79919579e01

  • SHA512

    fb979543e7796d87a84ba2e8651ad868cd7f641c72ea7be8cd290e63a27b113b38e0e0381aacde1030f4c64db0863bcedab473bc02a493da150baae6b73c7e69

  • SSDEEP

    98304:E/7PLmqXnHwOk1HjXGAfUG6TzQqQbIcdZlB:SWOyDWAfUj+

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

su1d.nerdpol.ovh:2288

Attributes
  • communication_password

    653d716345d8915046b904b90f41f271

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 736-359-0x0000000010440000-0x0000000010824000-memory.dmp
    .exe windows x86


    Headers

    Sections