General

  • Target

    Bon de commande.exe

  • Size

    26KB

  • Sample

    220121-qjlbxahfhm

  • MD5

    00286c04e7817a33d830719ef9afda61

  • SHA1

    3e59b07e3aa255dc4086c9c631d814ac201e9951

  • SHA256

    263b305d6a17491a0dd9dd32c5e56536263326e716e0474a132c1d8f8cc0878d

  • SHA512

    917d83abba42301eabf3e5bdc7450300150925955cc2b6ddb40b28338c2014ec30c234fad245bc19f5d5345f5ad5de55e0a738e7bb9fa96b765117c3410a8612

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

severdops.ddns.net:3071

Attributes
  • communication_password

    29ef52e7563626a96cea7f4b4085c124

  • tor_process

    tor

Targets

    • Target

      Bon de commande.exe

    • Size

      26KB

    • MD5

      00286c04e7817a33d830719ef9afda61

    • SHA1

      3e59b07e3aa255dc4086c9c631d814ac201e9951

    • SHA256

      263b305d6a17491a0dd9dd32c5e56536263326e716e0474a132c1d8f8cc0878d

    • SHA512

      917d83abba42301eabf3e5bdc7450300150925955cc2b6ddb40b28338c2014ec30c234fad245bc19f5d5345f5ad5de55e0a738e7bb9fa96b765117c3410a8612

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks