General

  • Target

    2000-141-0x0000000000E70000-0x0000000001AD9000-memory.dmp

  • Size

    12.4MB

  • MD5

    9a8959d5f2a30c13b2c880bc0fd7b4d1

  • SHA1

    00f90201a74f816b752b628d39b68471c47ff63b

  • SHA256

    3a538af1650f404f6d589499659f90ea54fd9bfcbb210f46b9a475a73fe16e51

  • SHA512

    663cc1dd603f1922963e4fc4768432adab0aa5515d3a56bb25631f2066c33743a2a58d17d181fcfd269a8746a916703d47b0920658d2a5aa39ef1c13b278f019

  • SSDEEP

    98304:uZbk/dZXDY8cF//cSi82r5ZKi0X3faFy9+Lgn/cTx8lAXZ7OS597W17xAHrC1yA9:DrzIN3M5ZCX/cTSlAp7IKHC6

Malware Config

Extracted

Family

cryptbot

Signatures

  • Cryptbot family
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2000-141-0x0000000000E70000-0x0000000001AD9000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections