General

  • Target

    4872-138-0x0000000010410000-0x00000000107F4000-memory.dmp

  • Size

    3.9MB

  • MD5

    cf1e8b3df85490f5e32ebef2a3a173d8

  • SHA1

    b8ab998a69a8215a38ce9f65db08c8f46ae4a47f

  • SHA256

    725d91ec34d61baa2330f7a3b2abd8c93b96fbae0dd3359402552aa8a3c21ab0

  • SHA512

    1a8e2e79782672130c5efc5b565c319d96471ee0465210f786afcfd6813ba8ed02ed5c4b9d7f2eeb8303b3bbb20419e0d10a9524edcec8e013eb452113fd2683

  • SSDEEP

    98304:l7RKCUqvxgjL4GhDZb62wGfnf6BoMvMU3G:Hp2MGJl62wCyk

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

su1d.nerdpol.ovh:2288

Attributes
  • communication_password

    653d716345d8915046b904b90f41f271

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 4872-138-0x0000000010410000-0x00000000107F4000-memory.dmp
    .exe windows x86


    Headers

    Sections