General

  • Target

    2956-3-0x00000000011C0000-0x0000000001E04000-memory.dmp

  • Size

    12.3MB

  • MD5

    a5e944d5d6567512bcbf9c3bcf004755

  • SHA1

    1a183e4cb7524c1540daedcb0d060dfaa7d851ab

  • SHA256

    66498971bc39c61cce739372ed4a6d57dbfd1cbf08979005a7c8e23092b58e29

  • SHA512

    2ff024756f6de385571b127a3f33dcfaf77b0f963cf9806bd261fb6339c7287afbc055d8bacf48f31e1711be496d24a4e9446fc8a94ef775b07867c8cb3f0344

  • SSDEEP

    98304:YZMX9+NrvjQccD543FmXfeaKNByzX3kIXkGXs1NdoCiJjHgA82r6rQdu3fkF:9YFc9h/eVFoCW866r6uPkF

Malware Config

Extracted

Family

cryptbot

Signatures

  • Cryptbot family
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2956-3-0x00000000011C0000-0x0000000001E04000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections