General

  • Target

    15a7f315e9aad523977d8bbca16fd44383fc6ad07dbc5bee16ebe53935a13b6b

  • Size

    4.2MB

  • Sample

    210228-4l73w2nsn2

  • MD5

    c1f83238767aa157dde6d5f7528c3a69

  • SHA1

    84f9120eafd223df2263263a6b7c5bd12fb06e3f

  • SHA256

    15a7f315e9aad523977d8bbca16fd44383fc6ad07dbc5bee16ebe53935a13b6b

  • SHA512

    8f7b675ea56ce8f7107f54c63aae8b4989e491b3d52305f46f30eab3e0a62990f3e7f0484dedad693e47c5c12de9697b96591d9f06bb4e09093244eaf83476b7

Malware Config

Targets

    • Target

      15a7f315e9aad523977d8bbca16fd44383fc6ad07dbc5bee16ebe53935a13b6b

    • Size

      4.2MB

    • MD5

      c1f83238767aa157dde6d5f7528c3a69

    • SHA1

      84f9120eafd223df2263263a6b7c5bd12fb06e3f

    • SHA256

      15a7f315e9aad523977d8bbca16fd44383fc6ad07dbc5bee16ebe53935a13b6b

    • SHA512

      8f7b675ea56ce8f7107f54c63aae8b4989e491b3d52305f46f30eab3e0a62990f3e7f0484dedad693e47c5c12de9697b96591d9f06bb4e09093244eaf83476b7

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT Payload

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks