General

  • Target

    3660-20-0x0000000000C60000-0x0000000000C7A000-memory.dmp

  • Size

    104KB

  • MD5

    c6a8aa39ecf49e971595bfc7fc7a3baf

  • SHA1

    3238992101201820639e6914646dcce76804dbcf

  • SHA256

    5248f6a3d4e1dc05961555be103ec9f4934efb77b154858f1e6b4749e01e7c9e

  • SHA512

    fdc903122b6626e93b363c52729e2a72732128ff2c1c19ca2d49cc8d92500c6dfe0657fd9e59ca65996a9032167084d5a5d535b612ddd5ee56869c62bf7450cc

  • SSDEEP

    1536:XafSWpStIsNuq+41TEkdzpj8lMsD17d4Ks+LcL1c0/5j7+TyTs:KjpStIsNewdzf01eKsS0/5yyw

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

158.220.95.214

172.232.208.90

194.233.91.144

158.220.95.215

84.247.157.112

Signatures

  • Pikabot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3660-20-0x0000000000C60000-0x0000000000C7A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections