General

  • Target

    286eeba27a7f7ee1caea16c8528d675b6e6a9bcab473cad323ad20c8849c4339

  • Size

    2.3MB

  • Sample

    220130-s987rsecd4

  • MD5

    6543de5acbefc3e9491105d2502bff02

  • SHA1

    93945122d841ed00fc47fde9ca35e18acb084da5

  • SHA256

    286eeba27a7f7ee1caea16c8528d675b6e6a9bcab473cad323ad20c8849c4339

  • SHA512

    e8d5ffe9655dc38d236f1f27e1a76268d4878c38bcf8ceab5e0ff8da6d7c528d2660ac16da7c9bdba7f3f94a2197598d4669d0547dfca389b0feacf8b51bfe42

Malware Config

Extracted

Family

bitrat

Version

1.35

C2

publiquilla.linkpc.net:9089

Attributes
  • communication_password

    bfdba24ee3d61f0260c4dc1034c3ee43

  • install_dir

    windowssecurirysercivehealtht

  • install_file

    windowssecuritrysercive.exe

  • tor_process

    tor

Targets

    • Target

      286eeba27a7f7ee1caea16c8528d675b6e6a9bcab473cad323ad20c8849c4339

    • Size

      2.3MB

    • MD5

      6543de5acbefc3e9491105d2502bff02

    • SHA1

      93945122d841ed00fc47fde9ca35e18acb084da5

    • SHA256

      286eeba27a7f7ee1caea16c8528d675b6e6a9bcab473cad323ad20c8849c4339

    • SHA512

      e8d5ffe9655dc38d236f1f27e1a76268d4878c38bcf8ceab5e0ff8da6d7c528d2660ac16da7c9bdba7f3f94a2197598d4669d0547dfca389b0feacf8b51bfe42

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks