General

  • Target

    1704-66-0x0000000000400000-0x00000000007E4000-memory.dmp

  • Size

    3.9MB

  • MD5

    906cf56209214190b561fa36de11c329

  • SHA1

    5915d86788ffcacefee5b0173db7070913d6b92c

  • SHA256

    eeb951eaac1b55ca819049813a93873a40f6dc4c1ec48a391eea9ee54f63033b

  • SHA512

    e6f35a684d8dda5af4f19e6d71dfd923703b13376f74df39783b5e00789b10528efc63c339b434e9b77c9139d9fad7ef7b84257cd7fa483b29a6732d48e7408f

  • SSDEEP

    98304:l77Pmq33rE/JDLPWZADUGer7B6iY74M/lmlwXVZ:x+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

212.83.173.68:2576

Attributes
  • communication_password

    d0970714757783e6cf17b26fb8e2298f

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1704-66-0x0000000000400000-0x00000000007E4000-memory.dmp
    .exe windows x86


    Headers

    Sections