General

  • Target

    2532-2-0x0000000000FA0000-0x0000000001BCD000-memory.dmp

  • Size

    12.2MB

  • MD5

    16c9340148fd2a9a3f75dba43f53ffee

  • SHA1

    24d2f1a7dcd9e9231be227799c40c61011c03483

  • SHA256

    ecd8cba822144f5cd50180e0b0a24bc27e1465fdf258fdc502a94ae482858f9d

  • SHA512

    a68d4c7128ff45515c0bdd6f1d57ec845a3a600a56f9835366f3265b2979b3a5fc0cfcdabc404d017ee60692d16d739680afa5ea8ef3c481f1f3098587509b08

  • SSDEEP

    98304:cAt86y6yGDKcnIcRv/qTxcl2Kp6sSenbLGLdUHpCrqMZX2E7EHgk:ei7ZLQq2ZU8dZmIEf

Malware Config

Extracted

Family

cryptbot

Signatures

  • Cryptbot family
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2532-2-0x0000000000FA0000-0x0000000001BCD000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections