General

  • Target

    3056-142-0x0000000000400000-0x00000000007E4000-memory.dmp

  • Size

    3.9MB

  • MD5

    0477808e2f8a3fa546d59f109114d57b

  • SHA1

    d163535a8232226786597b760e3b3e772c1f506a

  • SHA256

    3616dba14669835789c15e8fb8cf3eeeaca1902456a780893af2aeb8dc85b371

  • SHA512

    daa8fca66a59fa9abd509c65c93e613330a58c0849e7fc24e0dbfd8773dc7f908ab3e42881ea634d72b5c5d7b76eec701d8783f4bcb9984edbc04a0444c3d211

  • SSDEEP

    98304:V77Pmq33rE/JDLPWZADUGer7B6iY74M/7mlwXVZy:h+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

celesperial.ddns.net:5200

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 3056-142-0x0000000000400000-0x00000000007E4000-memory.dmp
    .exe windows x86


    Headers

    Sections