General

  • Target

    1344-66-0x0000000000400000-0x00000000007E4000-memory.dmp

  • Size

    3.9MB

  • MD5

    e56d8982768e9d4ff544ce9c25ee9c34

  • SHA1

    9d7017472663693ce4e2404f8408d2d478f8a474

  • SHA256

    567614ca91075b4039e3b1a7bbcdde6fab30dcd27fa7d1e0fb40c280dc728323

  • SHA512

    6daaf9d2b2d4fe3f0f50e6d20aa9355313b91ae417cd8bcc020e5fbc90813a84eb46220615ba0de5f6c65014d856b05bbea9d9ecee9da6333f7fbe6f532e795f

  • SSDEEP

    98304:s77Pmq33rE/JDLPWZADUGer7B6iY74M/PmlwXVZ:6+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

62.210.11.126:9024

Attributes
  • communication_password

    57e9678c1972887ccb37a6296021d65d

  • tor_process

    tor

Signatures

  • Bitrat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1344-66-0x0000000000400000-0x00000000007E4000-memory.dmp
    .exe windows x86


    Headers

    Sections