General

  • Target

    INVOICE.exe

  • Size

    1.6MB

  • Sample

    220623-ce5m4aeah7

  • MD5

    dcc3fab0819a6859a896f163c78d8d8f

  • SHA1

    356682a4ed7d49531f61caf30b3ce705909ef35d

  • SHA256

    5b35b7ece66692f0291cfd6d27bb430a4c0680e6a9706fbca578b90799786458

  • SHA512

    1039d8f79fdb9563814b72ca7866e3aab3e37999405f5ce5502ce47fad38c09930e51e4f2c8a85b27533e84fc254e8cead5462ae5d2640b9dbee4f4c93b60091

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bitrat9400.duckdns.org:9400

Attributes
  • communication_password

    e10adc3949ba59abbe56e057f20f883e

  • tor_process

    tor

Targets

    • Target

      INVOICE.exe

    • Size

      1.6MB

    • MD5

      dcc3fab0819a6859a896f163c78d8d8f

    • SHA1

      356682a4ed7d49531f61caf30b3ce705909ef35d

    • SHA256

      5b35b7ece66692f0291cfd6d27bb430a4c0680e6a9706fbca578b90799786458

    • SHA512

      1039d8f79fdb9563814b72ca7866e3aab3e37999405f5ce5502ce47fad38c09930e51e4f2c8a85b27533e84fc254e8cead5462ae5d2640b9dbee4f4c93b60091

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks