Behavioral task
behavioral1
Sample
4860-166-0x0000000000400000-0x00000000004BC000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4860-166-0x0000000000400000-0x00000000004BC000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
4860-166-0x0000000000400000-0x00000000004BC000-memory.dmp
-
Size
752KB
-
MD5
c736907d9a335154df4a6659652cf477
-
SHA1
ec6e4df85af37153591d040d9c127bfcd26c75d6
-
SHA256
ddd4687ac7d6f29560f5a8c84460c73f22d0b9fb4b9d640ad9c9c2cd0e145e41
-
SHA512
15f7d08d4911820bb824002f689a5572a116c979c47de9ce040851545dfc8303600c311202aae1b7883fc15a5f41d9bfeac6b981cc8e51a7131ca6815105d3a4
-
SSDEEP
12288:1P3pyN9YvNfc3yTvo7Q1DlQlmHcINzdDsD020HmtOgwyFsXNJg6DbeB3I6TCyxhD:mENf7OQXqmHcINJQI20HmtNwGENJPeBn
Malware Config
Extracted
cryptbot
http://fygqwg52.top/gate.php
-
payload_url
http://qatfil07.top/huckle.dat
Signatures
-
Cryptbot family
Files
-
4860-166-0x0000000000400000-0x00000000004BC000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 563KB - Virtual size: 563KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ