General

  • Target

    c614fa76709aaea6922468455d22169a92d2c4c0.exe

  • Size

    2.0MB

  • Sample

    211217-2qjmfafagq

  • MD5

    89ba278cda54e11fcf5def480729eb1f

  • SHA1

    c614fa76709aaea6922468455d22169a92d2c4c0

  • SHA256

    22548397f8ffb20d88d649678c9b09013118eb159bf3b5fa3532e28051a4e2b3

  • SHA512

    85f50e0447f2088778356737183926bd391afb0c83b8ad2c40293e7583edbd026cca9c94da5d5d41e225e26bbe3401a60f2f55a742a63e7a3ff621fe796ceacb

Score
10/10

Malware Config

Targets

    • Target

      c614fa76709aaea6922468455d22169a92d2c4c0.exe

    • Size

      2.0MB

    • MD5

      89ba278cda54e11fcf5def480729eb1f

    • SHA1

      c614fa76709aaea6922468455d22169a92d2c4c0

    • SHA256

      22548397f8ffb20d88d649678c9b09013118eb159bf3b5fa3532e28051a4e2b3

    • SHA512

      85f50e0447f2088778356737183926bd391afb0c83b8ad2c40293e7583edbd026cca9c94da5d5d41e225e26bbe3401a60f2f55a742a63e7a3ff621fe796ceacb

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT Payload

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks