General

  • Target

    083d5efb4da09432a206cb7fba5cef2c82dd6cc080015fe69c2b36e71bca6c89

  • Size

    3.2MB

  • Sample

    210305-catcja4ega

  • MD5

    2db8431e25227cb5d42e8e6d5b0e3856

  • SHA1

    5f34eb3c4243445c92c7e4d806e3ce6be4b76a8b

  • SHA256

    083d5efb4da09432a206cb7fba5cef2c82dd6cc080015fe69c2b36e71bca6c89

  • SHA512

    144051e479059f559ed77a8d8635062d0c74257f34f33dacc3253cb2ef7ad954d5d043dd65e27a20bc748e5ab8c93808fbd7ef1ad51fdfa04710307484ddf59e

Score
10/10

Malware Config

Targets

    • Target

      083d5efb4da09432a206cb7fba5cef2c82dd6cc080015fe69c2b36e71bca6c89

    • Size

      3.2MB

    • MD5

      2db8431e25227cb5d42e8e6d5b0e3856

    • SHA1

      5f34eb3c4243445c92c7e4d806e3ce6be4b76a8b

    • SHA256

      083d5efb4da09432a206cb7fba5cef2c82dd6cc080015fe69c2b36e71bca6c89

    • SHA512

      144051e479059f559ed77a8d8635062d0c74257f34f33dacc3253cb2ef7ad954d5d043dd65e27a20bc748e5ab8c93808fbd7ef1ad51fdfa04710307484ddf59e

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT Payload

    • Drops startup file

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks