General
-
Target
fxdgf.exe
-
Size
1.7MB
-
Sample
220622-s535yshfaq
-
MD5
6505bd7c5e3775f45522cead41f38882
-
SHA1
c13140dc82455007a70c7747b4f6aaee5e549315
-
SHA256
c8e1ce5d1216e1e068af5fc38b107b78f32372f69d59b4f1e6a456770ded8744
-
SHA512
96998ce4683585d2913d3526bbdc48180fc373feb6e02320fff948284a4aeea9136886a2a8ffc5574c9b0651f8ce239ec81be717a9ed163f9e2442b70587ec5e
Static task
static1
Behavioral task
behavioral1
Sample
fxdgf.exe
Resource
win7-20220414-en
Malware Config
Extracted
bitrat
1.38
bitrat9300.duckdns.org:9300
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Targets
-
-
Target
fxdgf.exe
-
Size
1.7MB
-
MD5
6505bd7c5e3775f45522cead41f38882
-
SHA1
c13140dc82455007a70c7747b4f6aaee5e549315
-
SHA256
c8e1ce5d1216e1e068af5fc38b107b78f32372f69d59b4f1e6a456770ded8744
-
SHA512
96998ce4683585d2913d3526bbdc48180fc373feb6e02320fff948284a4aeea9136886a2a8ffc5574c9b0651f8ce239ec81be717a9ed163f9e2442b70587ec5e
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-