General

  • Target

    4448-948-0x0000000000400000-0x00000000007CE000-memory.dmp

  • Size

    3.8MB

  • MD5

    ebc7d3d99a9f2262625b75baa1935c7a

  • SHA1

    c4b620ed3532a54afab0970e73aa88d413872088

  • SHA256

    db9c6827cef367487bccf0f29577169054539c04bfa9c0777e575b9297264ea3

  • SHA512

    d30403908ee1611fa9d712fa8d2cc0f12926a1d80422dbdd6707d533bac7e3ea9b2fd81e1b0443142e8ce83f30ed5650bdd4bc444a608319da04999397dcbb7e

  • SSDEEP

    98304:877Pmq33rE/JDLPWZADUGer7B6iY74M/kmlwXVZMFB:K+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

pradeepprabhu705.ddns.net:313

Attributes
  • communication_password

    827ccb0eea8a706c4c34a16891f84e7b

  • tor_process

    tor

Signatures

  • Bitrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4448-948-0x0000000000400000-0x00000000007CE000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections