Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-06-2022 15:17

General

  • Target

    3632-138-0x0000000000400000-0x00000000007E4000-memory.exe

  • Size

    3.9MB

  • MD5

    9116d7841343c21d81b0c162d4fe8e42

  • SHA1

    68a8898d40b070088f6423cc49ad14ca8e996c39

  • SHA256

    e8710d704e917ff5ce08bbf8688587f0289fc38c9f2469d8bbc004ec29643e72

  • SHA512

    a431e8a3d75ccf517492dc7e62f716b1dff4e2b76e51e663673f50d9c045fc2ec57d41a6d36a05b3c9e481540affb3d3977c313d0e33ae5a8adccaa139383924

Score
10/10

Malware Config

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3632-138-0x0000000000400000-0x00000000007E4000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3632-138-0x0000000000400000-0x00000000007E4000-memory.exe"
    1⤵
      PID:1008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1008-54-0x0000000000400000-0x00000000007E4000-memory.dmp

      Filesize

      3.9MB