General

  • Target

    43e0eed9a47f0eb655af50a9aacd02b1.exe

  • Size

    2.0MB

  • Sample

    211220-yzd7jacedl

  • MD5

    43e0eed9a47f0eb655af50a9aacd02b1

  • SHA1

    6dbc00b84c23fc44857bd81cc69fe62430bf9c82

  • SHA256

    b67e1dc98007c0bf5afa9ca1f840de158cb01eedbce373d791b80059de98b011

  • SHA512

    12c160f00b6a50ed84d4e3d90971cad17d67048e291210bef2e8bff8bb8acbfc18f0de26284e1f5289f9612c3efcd1659068f886404cd0e21487a9a109207f75

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

107.172.44.141:2030

Attributes
  • communication_password

    5f4dcc3b5aa765d61d8327deb882cf99

  • tor_process

    tor

Targets

    • Target

      43e0eed9a47f0eb655af50a9aacd02b1.exe

    • Size

      2.0MB

    • MD5

      43e0eed9a47f0eb655af50a9aacd02b1

    • SHA1

      6dbc00b84c23fc44857bd81cc69fe62430bf9c82

    • SHA256

      b67e1dc98007c0bf5afa9ca1f840de158cb01eedbce373d791b80059de98b011

    • SHA512

      12c160f00b6a50ed84d4e3d90971cad17d67048e291210bef2e8bff8bb8acbfc18f0de26284e1f5289f9612c3efcd1659068f886404cd0e21487a9a109207f75

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks