General

  • Target

    1.exe

  • Size

    1.8MB

  • Sample

    220426-tl12xshagn

  • MD5

    a472acc9bfb5d5ae1f0e847edd0fd5c3

  • SHA1

    f060f136fe9a6af93c09afb654c1696b7817c886

  • SHA256

    7fac44c988fec727ab87f109038220a207807a2d6cb5966c62920cf2fa6ece64

  • SHA512

    f4e3e901c3aa867907dd912bfa123947d18d496abbea94c371f18c1c114f747855bdff7d468da3f9d671500a8c5ac5094bd9ba6c5e86e61ab2fa58f5e083944c

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bitrat9300.duckdns.org:9300

Attributes
  • communication_password

    e10adc3949ba59abbe56e057f20f883e

  • tor_process

    tor

Targets

    • Target

      1.exe

    • Size

      1.8MB

    • MD5

      a472acc9bfb5d5ae1f0e847edd0fd5c3

    • SHA1

      f060f136fe9a6af93c09afb654c1696b7817c886

    • SHA256

      7fac44c988fec727ab87f109038220a207807a2d6cb5966c62920cf2fa6ece64

    • SHA512

      f4e3e901c3aa867907dd912bfa123947d18d496abbea94c371f18c1c114f747855bdff7d468da3f9d671500a8c5ac5094bd9ba6c5e86e61ab2fa58f5e083944c

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks