General

  • Target

    3768-566-0x0000000000A90000-0x0000000001706000-memory.dmp

  • Size

    12.5MB

  • MD5

    3b6fb85e15c7b93bb20baa0087910127

  • SHA1

    966079266a7078d491de519dea06e4461301926b

  • SHA256

    8da3fef8c9ed41a2e3f9ab3a70024ebb7512c3087cee8d566f415e22b774d2eb

  • SHA512

    b080f6eb305f148d3ce2ab65c826872a1ce59a3242e49515273907f170220254b2c425c3c08045a1d627f4b8ca64181489166ab2c760e323c584acd2244f613b

  • SSDEEP

    98304:iRFAmk5LIuDd8myoM5hphILKK4ztfJNS9d8nRQUxSj/lHMqaOZL95ecA5glw:hnVbVSILKjCHMqZZzBA5gl

Malware Config

Extracted

Family

cryptbot

Signatures

  • Cryptbot family
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3768-566-0x0000000000A90000-0x0000000001706000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections