General

  • Target

    ad0838439c7f741b80af14870d6335e02e2d76ac29d8d1fe7506f66562c26339

  • Size

    2.1MB

  • Sample

    220121-3a7j1adabq

  • MD5

    67ec6b9c6ecea354319ea57391b818f9

  • SHA1

    aa1d5b3217058c8d0f8cad302d95de32a74d236d

  • SHA256

    ad0838439c7f741b80af14870d6335e02e2d76ac29d8d1fe7506f66562c26339

  • SHA512

    40dab32e2b9cb8407e18a3059a43d467871b4bf4d44b6a50b144457c3292e4104a77f4ae529fee3eab03d4b556d14b8606411b89cb55367fd085e7280b18fea8

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

jairoandresotalvarorend.linkpc.net:9085

Attributes
  • communication_password

    bfdba24ee3d61f0260c4dc1034c3ee43

  • install_dir

    Googlechromeinite

  • install_file

    Googlechromeinit.exe

  • tor_process

    tor

Targets

    • Target

      ad0838439c7f741b80af14870d6335e02e2d76ac29d8d1fe7506f66562c26339

    • Size

      2.1MB

    • MD5

      67ec6b9c6ecea354319ea57391b818f9

    • SHA1

      aa1d5b3217058c8d0f8cad302d95de32a74d236d

    • SHA256

      ad0838439c7f741b80af14870d6335e02e2d76ac29d8d1fe7506f66562c26339

    • SHA512

      40dab32e2b9cb8407e18a3059a43d467871b4bf4d44b6a50b144457c3292e4104a77f4ae529fee3eab03d4b556d14b8606411b89cb55367fd085e7280b18fea8

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks