General

  • Target

    1716-65-0x0000000000400000-0x00000000007E4000-memory.dmp

  • Size

    3.9MB

  • MD5

    ec922dcc7a4825ce1708e6a24b09e198

  • SHA1

    cde305b209263cf6e6da6cb66ec69285c35a3308

  • SHA256

    51ce1bad7dc3f770deaf7d741b1a48f6a6d49f31973b554f19a255df193bb7a8

  • SHA512

    2a36a568c6887a5d8e22c1d449a0fc818931e8b7a219821a2c65468d71a31af76f7971c1d54e8976b242627974172ee44f403a41bd71135fff7d861721a9ecc2

  • SSDEEP

    98304:277Pmq33rE/JDLPWZADUGer7B6iY74M/6mlwXVZ:o+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

celesperial.ddns.net:5200

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1716-65-0x0000000000400000-0x00000000007E4000-memory.dmp
    .exe windows x86


    Headers

    Sections