General

  • Target

    PO#W056931PDF.exe

  • Size

    1.8MB

  • Sample

    220624-helswaaecn

  • MD5

    1fe364ea6a61d9030191db48309cd0c1

  • SHA1

    b16caf8eb59c391670ff34e9d7ad0502c9c27012

  • SHA256

    970406f2773fbbfc31cf831fb6c5de0b4fbc206e5f5fa9c93ad06e1209bda266

  • SHA512

    306278cdf03441afb2aa57792c96d1802906799d086d644feab0843ec0eef216df06ae02ac59663258423408f8686d6d7076ca41764bff8296fcdf8ab0f7050b

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

godfavor.duckdns.org:2349

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Targets

    • Target

      PO#W056931PDF.exe

    • Size

      1.8MB

    • MD5

      1fe364ea6a61d9030191db48309cd0c1

    • SHA1

      b16caf8eb59c391670ff34e9d7ad0502c9c27012

    • SHA256

      970406f2773fbbfc31cf831fb6c5de0b4fbc206e5f5fa9c93ad06e1209bda266

    • SHA512

      306278cdf03441afb2aa57792c96d1802906799d086d644feab0843ec0eef216df06ae02ac59663258423408f8686d6d7076ca41764bff8296fcdf8ab0f7050b

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks