General

  • Target

    7551386119.zip

  • Size

    1.5MB

  • Sample

    220610-s85syshbh8

  • MD5

    1885e812d6abaac1b0bdf67558b4ba06

  • SHA1

    b7f12258975bfa9784d2cd4cee0eaf6cbbbe48a2

  • SHA256

    a63ec7da70dc56049227041e320a1518c98654a1baa9a9fdfef3f11a979920d7

  • SHA512

    8f29e059cce91b74256d127ee18c66fb0d1553e3b7bedaa13942443796c11bd0f5aca8eb8ec053bfb7f5cafa7175d766be6eb83c3d858a60ad192b8f9557bb8d

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bitrat9300.duckdns.org:9300

Attributes
  • communication_password

    e10adc3949ba59abbe56e057f20f883e

  • tor_process

    tor

Targets

    • Target

      D7M39A87SH3-ETRANSFER-RECEIPT.exe

    • Size

      300.0MB

    • MD5

      edd26deecff12183dc818957f18b866a

    • SHA1

      7e4fc7d57f7502ad210ceafbe294716981585281

    • SHA256

      0b6306bc128b16b99cee0d04e4427bc0b5dbe32b2386fc4800cf42c9f42ed3b3

    • SHA512

      b86225d429f244077f1a4313318e034320da2091a02a8064065b2fbd290eaa5285adfe90a161886f6a13dcba996f536da6758da78cf54ec01c900369db841987

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks