Behavioral task
behavioral1
Sample
f6631cb0b90dad50436e54e1626d6684bb4188a451dd1168e72df5ca67583af7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6631cb0b90dad50436e54e1626d6684bb4188a451dd1168e72df5ca67583af7.exe
Resource
win10v2004-20240226-en
General
-
Target
4443b57c1262fbc156765ba2a9019391.bin
-
Size
1.8MB
-
MD5
134d7611d80deb8ac3f0310a9f79b95a
-
SHA1
e7f9c0af845985480514f4322cd3b221a889011f
-
SHA256
4936f7f1de966e9a301dd7faedaee919f4888751294a491f94dcb76e524dd1c4
-
SHA512
5ce4412de218dbf9ada7e73badb3b516539b0413e59a81a688225f25dc2714022ff2db4f0081b8a7f1a6af26f53ceb9be67fe5822c53c6a3604bc73d051a570d
-
SSDEEP
24576:Egg/Drt+Lh1GM6UTl6o7ipcoMYbcwCNDZV91QAK4MsAyGEFp/KSBEHF62mh5Z0aQ:s4PGfUTccAUdNQnylp/K5HoD9zyIzS
Malware Config
Extracted
bitrat
1.38
103.153.182.247:6161
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Signatures
-
Bitrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f6631cb0b90dad50436e54e1626d6684bb4188a451dd1168e72df5ca67583af7.exe
Files
-
4443b57c1262fbc156765ba2a9019391.bin.zip
Password: infected
-
f6631cb0b90dad50436e54e1626d6684bb4188a451dd1168e72df5ca67583af7.exe.exe windows:5 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 687KB - Virtual size: 686KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ