General

  • Target

    06944dc79f37f8d56bea41e2e3fd7c001d2e16d493285811e525f52440ef268a

  • Size

    1.9MB

  • Sample

    220130-t6c6laedgl

  • MD5

    1eacfabba668e2f37f17a3177e14d1d1

  • SHA1

    52c45d6f0faa7ec928e7d37c05ffcac0a6b79adb

  • SHA256

    06944dc79f37f8d56bea41e2e3fd7c001d2e16d493285811e525f52440ef268a

  • SHA512

    aebf87e2f7fbe1f8682673d664b7a0348b003fbcaae996cdb37a8f9f73846a2a33880e9fc51e7567db16cd2b1c9a02fa947d2816858bd79a0ba7c2fac7d7968a

Malware Config

Extracted

Family

bitrat

Version

1.35

C2

publiquilla.linkpc.net:9097

Attributes
  • communication_password

    bfdba24ee3d61f0260c4dc1034c3ee43

  • install_dir

    System320772736e3b1d119b3

  • install_file

    System320772736e3b1d119b.exe

  • tor_process

    tor

Targets

    • Target

      06944dc79f37f8d56bea41e2e3fd7c001d2e16d493285811e525f52440ef268a

    • Size

      1.9MB

    • MD5

      1eacfabba668e2f37f17a3177e14d1d1

    • SHA1

      52c45d6f0faa7ec928e7d37c05ffcac0a6b79adb

    • SHA256

      06944dc79f37f8d56bea41e2e3fd7c001d2e16d493285811e525f52440ef268a

    • SHA512

      aebf87e2f7fbe1f8682673d664b7a0348b003fbcaae996cdb37a8f9f73846a2a33880e9fc51e7567db16cd2b1c9a02fa947d2816858bd79a0ba7c2fac7d7968a

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks