General

  • Target

    af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991

  • Size

    3.2MB

  • Sample

    210305-7rckpwfje2

  • MD5

    d1a586b0b894c54dd7b075e5a9bbae85

  • SHA1

    c77b27b7cc3bc69b867fb2527d8226030665074f

  • SHA256

    af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991

  • SHA512

    0adc5cf09b3d4dc0228d6dfdd46bef1b54cde2f5d533d86ba07c5970ef69e5296bf44b24daff34682a75f47e56d79da13e6927b0c220de64ef6ba4c2d71440c1

Score
10/10

Malware Config

Targets

    • Target

      af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991

    • Size

      3.2MB

    • MD5

      d1a586b0b894c54dd7b075e5a9bbae85

    • SHA1

      c77b27b7cc3bc69b867fb2527d8226030665074f

    • SHA256

      af05a9b5f7ed6483d7f10ea0e521e0a15fd90d224ca04a9665991ab630a54991

    • SHA512

      0adc5cf09b3d4dc0228d6dfdd46bef1b54cde2f5d533d86ba07c5970ef69e5296bf44b24daff34682a75f47e56d79da13e6927b0c220de64ef6ba4c2d71440c1

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT Payload

    • Drops startup file

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks