General

  • Target

    tst.exe

  • Size

    1.4MB

  • MD5

    3412592c23a9bc93a234c5e25130a71a

  • SHA1

    cad0b43ff636a6d6dbbfbd38e134aa0acda7b052

  • SHA256

    017ab0c10991b0d3faa2b6fdc43487632418c4f5a337e94f8490233d254ba566

  • SHA512

    2076c9ebf616986a5e7a309bc105639abaf1ece7fcc69585457026371353aca82377f70f2903340ed28f40b69f9314c925f2319431d05b0ea527ab4ce0bd75a3

  • SSDEEP

    24576:2ndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkz6Nf6F6j4:gXDFBU2iIBb0xY/6sUYYf56Fu4

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

45.95.168.128:23202

Attributes
  • communication_password

    ed99c23d77796aac877ce1f91481dc28

  • install_dir

    Oracle

  • install_file

    java.exe

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • tst.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections