General
-
Target
tts_211.exe
-
Size
1.8MB
-
Sample
211220-k2rczsahhl
-
MD5
9a468b8d65c5e178f7f102aba60c098c
-
SHA1
b8ab231f494f2c158f433b1c213ef557492b5148
-
SHA256
41ae4a22dbe73a3263a6556f0dd96a1e12909b23b69c9f93f3e86a5821aaa0ed
-
SHA512
838c16f2942e1b0796e7ff440c6dd1f3e0266ab0d1ce0cb78798388aa13bff3c28d0ce8ffa13f202d3bbfaeedf15a722f04315f3ef6d2efb624fb342a25d84cb
Static task
static1
Behavioral task
behavioral1
Sample
tts_211.exe
Resource
win7-en-20211208
Malware Config
Extracted
bitrat
1.38
volc.ddns.net:21501
-
communication_password
d57285fa81b86687bf3a97dc3255ad98
-
tor_process
tor
Targets
-
-
Target
tts_211.exe
-
Size
1.8MB
-
MD5
9a468b8d65c5e178f7f102aba60c098c
-
SHA1
b8ab231f494f2c158f433b1c213ef557492b5148
-
SHA256
41ae4a22dbe73a3263a6556f0dd96a1e12909b23b69c9f93f3e86a5821aaa0ed
-
SHA512
838c16f2942e1b0796e7ff440c6dd1f3e0266ab0d1ce0cb78798388aa13bff3c28d0ce8ffa13f202d3bbfaeedf15a722f04315f3ef6d2efb624fb342a25d84cb
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Uses the VBS compiler for execution
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-