General

  • Target

    7544806122.zip

  • Size

    1.5MB

  • Sample

    220607-q5hg5sfae3

  • MD5

    a21e71571f426c451c286f59557615c7

  • SHA1

    dde61bd00353a42c0570390f54d35ebf6eaff8eb

  • SHA256

    9a05216cb28b7a4e5f341458edf1fdeeb5f170aad7f3e254f5a334fb3be48b00

  • SHA512

    eca4fe4d7aff0403def35c5c9d3273d64167807b9ceba6e3a4766b2b8abc07be682b860c1f50ce85c78cf7e7a5c0df24a9f0bae046aa299eabe4bde239504a75

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bitrat9300.duckdns.org:9300

Attributes
  • communication_password

    e10adc3949ba59abbe56e057f20f883e

  • tor_process

    tor

Targets

    • Target

      EIAK8SDE_ETRANSFER_RECEIPT.exe

    • Size

      300.0MB

    • MD5

      e6bc6a1d4120514519d615dd24d3d154

    • SHA1

      4310a252bc6dc162e56051913820d37a7980a1ed

    • SHA256

      261b4cf41fc8e008696a3a4704499cd8639bcbc27f6b4f8233d8253231b0de93

    • SHA512

      14e3cc9bae4bffc8dc9c097be7b484450d2827996a874a4ae36a3e8def5000881dba3e84afffa59884f8c122fdbe77457fd8da532ddd8834e0d44788886d460c

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks