Behavioral task
behavioral1
Sample
1360-82-0x0000000000400000-0x0000000000BD8000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1360-82-0x0000000000400000-0x0000000000BD8000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1360-82-0x0000000000400000-0x0000000000BD8000-memory.dmp
-
Size
7.8MB
-
MD5
54bb31dbd692a0d89cf8764065933931
-
SHA1
07c710cef484368df4ea06d6c01709ad4930af5a
-
SHA256
3dc6c95337af13d9fe20c9103162bde38e6331ba1f10b931c646d06da75cb646
-
SHA512
cb8488477f313bc0d1dd182832d2f0b3f90d5e03ab6c389eb9136ff5211c5c96ad040f4eec2418b858fdf9d05dd9294ac64ea54324f4aa326e68d5b25ba71b46
-
SSDEEP
196608:LIRcbH4jSteTGv2xwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:LdHsfu2xwZ6v1CPwDv3uFteg2EeJUO9E
Malware Config
Extracted
bitrat
1.38
rxbwrzmdaw27pt7lrrhophwwlcyuqkw3n2dhpr5gu5bjh3ut2ot2mwid.onion:80
-
communication_password
5ffc3746012bb1139c6bf49107694c1a
-
tor_process
Smartscreens
Signatures
-
Bitrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1360-82-0x0000000000400000-0x0000000000BD8000-memory.dmp
Files
-
1360-82-0x0000000000400000-0x0000000000BD8000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 688KB - Virtual size: 687KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ