General

  • Target

    SWIFT_COPY00993Payment_advic4555pdf.exe

  • Size

    2.9MB

  • Sample

    210111-ctnm1dlqhx

  • MD5

    344811104b9deac44b95852d3dbf89ec

  • SHA1

    9ab4420fc25c66fca63aa43f17fcb956def07433

  • SHA256

    18da6bd51f14bd9ffca136121586de47bad598fb4652f9a48044290377fcec61

  • SHA512

    ae28492c462447ff2856682080d8b68a9cb8394900431a37c58bcd959df90037c237220269db0bbdef03b5111327c8ec5ff57b683552e1886d05e034679a900e

Malware Config

Targets

    • Target

      SWIFT_COPY00993Payment_advic4555pdf.exe

    • Size

      2.9MB

    • MD5

      344811104b9deac44b95852d3dbf89ec

    • SHA1

      9ab4420fc25c66fca63aa43f17fcb956def07433

    • SHA256

      18da6bd51f14bd9ffca136121586de47bad598fb4652f9a48044290377fcec61

    • SHA512

      ae28492c462447ff2856682080d8b68a9cb8394900431a37c58bcd959df90037c237220269db0bbdef03b5111327c8ec5ff57b683552e1886d05e034679a900e

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks