General

  • Target

    Invoice #003982.img

  • Size

    1.6MB

  • Sample

    220608-v48edsdfa4

  • MD5

    0a2e97e09b19de3cee8be06a4916d4bf

  • SHA1

    fb379fa0d9966f7ff44f456d6f624103f47aa61e

  • SHA256

    a5ee4d2e4178ed6146ebf5cae26570b007272ac755b5088d607894fdb986972b

  • SHA512

    5795f8447aa144cbd4eadf83b3af4fe8bc00ecaa3018ba6a30b9da6817d63f479caa82b817bdd41c33ab1a4c9b1acb985fab49c1b2535a6b72e9aff08d87c39d

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

oka.nerdpol.ovh:2223

Attributes
  • communication_password

    b6c6e855edf908ec7c12ce8c8e628a5c

  • tor_process

    tor

Targets

    • Target

      AEPFXFNV.EXE

    • Size

      1.0MB

    • MD5

      3daa66d053bf5aa603c9db0af979d2b7

    • SHA1

      5beb955aef82e5e487b50c3a7ba38ec76d93e760

    • SHA256

      bda842fc1f63fc6ab60f1964cbb4f25e655b92ffa0009d4b9a91f293e9b4f228

    • SHA512

      fd54c4568d7e508ce0b47ed6d71f519608b3e850bac54bba8f3f2dcdfa49fe9cc71caf366ebf089d090c399c25c8c2842fe9c6a1b7b494f1d03cf0b6bb8a91cb

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks