General

  • Target

    0b032e83c3a78f61fa3bf9cebd5a0242.exe

  • Size

    4.5MB

  • Sample

    211230-j3vw5aeccj

  • MD5

    0b032e83c3a78f61fa3bf9cebd5a0242

  • SHA1

    f39705cde333b8c104f0a0381aa85de5a9d40e23

  • SHA256

    4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec

  • SHA512

    776674d9a1e9ec68dd4f2a3d4deaf7eec921b3a306874f15956a70491bf6bb166d7994039dc724afcc1e1ed9150a91116965a79e8a320e37dced402d258e5a77

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

queentaline.ddns.net:1117

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • tor_process

    tor

Targets

    • Target

      0b032e83c3a78f61fa3bf9cebd5a0242.exe

    • Size

      4.5MB

    • MD5

      0b032e83c3a78f61fa3bf9cebd5a0242

    • SHA1

      f39705cde333b8c104f0a0381aa85de5a9d40e23

    • SHA256

      4dbfb66b1aca617e4af7d11dcc9d97b11e61e94b188283a8f17f9078df30dbec

    • SHA512

      776674d9a1e9ec68dd4f2a3d4deaf7eec921b3a306874f15956a70491bf6bb166d7994039dc724afcc1e1ed9150a91116965a79e8a320e37dced402d258e5a77

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • Deletes itself

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks