General

  • Target

    fxdgf.exe

  • Size

    1.7MB

  • Sample

    220622-s45x6ahehr

  • MD5

    6505bd7c5e3775f45522cead41f38882

  • SHA1

    c13140dc82455007a70c7747b4f6aaee5e549315

  • SHA256

    c8e1ce5d1216e1e068af5fc38b107b78f32372f69d59b4f1e6a456770ded8744

  • SHA512

    96998ce4683585d2913d3526bbdc48180fc373feb6e02320fff948284a4aeea9136886a2a8ffc5574c9b0651f8ce239ec81be717a9ed163f9e2442b70587ec5e

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bitrat9300.duckdns.org:9300

Attributes
  • communication_password

    e10adc3949ba59abbe56e057f20f883e

  • tor_process

    tor

Targets

    • Target

      fxdgf.exe

    • Size

      1.7MB

    • MD5

      6505bd7c5e3775f45522cead41f38882

    • SHA1

      c13140dc82455007a70c7747b4f6aaee5e549315

    • SHA256

      c8e1ce5d1216e1e068af5fc38b107b78f32372f69d59b4f1e6a456770ded8744

    • SHA512

      96998ce4683585d2913d3526bbdc48180fc373feb6e02320fff948284a4aeea9136886a2a8ffc5574c9b0651f8ce239ec81be717a9ed163f9e2442b70587ec5e

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks