General

  • Target

    badbadnotgood.exe

  • Size

    112KB

  • Sample

    220117-y6agxscbh9

  • MD5

    cc53642dc142809c56f656d8ee702650

  • SHA1

    a18dcff5ec9ff5027309790d8bc0dd660cae38b8

  • SHA256

    512ce7a1f66a65d818533dc79f2eb3dbb31696961e45f34e3a2ce98080488dc3

  • SHA512

    31deb2edede5999afa926041700ecec71c734c5d76b88f548bd702dc66fc0fe7e7b0cf2578f80a7196d027577cb9850240af593af669c815ed43b9de3e7a6f2f

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

drfcjug.duckdns.org:1882

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Targets

    • Target

      badbadnotgood.exe

    • Size

      112KB

    • MD5

      cc53642dc142809c56f656d8ee702650

    • SHA1

      a18dcff5ec9ff5027309790d8bc0dd660cae38b8

    • SHA256

      512ce7a1f66a65d818533dc79f2eb3dbb31696961e45f34e3a2ce98080488dc3

    • SHA512

      31deb2edede5999afa926041700ecec71c734c5d76b88f548bd702dc66fc0fe7e7b0cf2578f80a7196d027577cb9850240af593af669c815ed43b9de3e7a6f2f

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks