General

  • Target

    1476-2-0x0000000000950000-0x000000000161B000-memory.dmp

  • Size

    12.8MB

  • MD5

    1f1740852e8e8673589c6a9040ed0df1

  • SHA1

    5a902f9a06ff800f223174dc7d4871a0a15a3d58

  • SHA256

    a2beafe07a46ce87a4fb9a6c5d5c9d0d953e0d681b9d7b492d0d7a72b688f1f8

  • SHA512

    207a52abfe4237e5b750dbd1d4e042fc0661a75bca5060dd7a3eeecd24847657bbc2126761991aef3d2d30bb60d22e01d2581259e49175f3ef7e1d4b4de36843

  • SSDEEP

    98304:tzoKPY50FXOf8QX2eGw6xe+KAe+yvOtGQmTvac0UDYPXN3Q/K6zUp+3Jx0:Xg5GXwmpe+ivacZkX9Qi6zY

Malware Config

Extracted

Family

cryptbot

Signatures

  • Cryptbot family
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1476-2-0x0000000000950000-0x000000000161B000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections