General
-
Target
aaf528c6e9dcc6876871abd209ae90a8.exe
-
Size
3.8MB
-
Sample
220627-qxx8mabfgn
-
MD5
aaf528c6e9dcc6876871abd209ae90a8
-
SHA1
9f6392d28cdf543b5508ce7e86f0dc26df53cc0c
-
SHA256
3d464460a5eca975b045bdf92d3cc2952047279a06a7d618c6ea2c8b66ddce2c
-
SHA512
11452d10f571800290880696695f4cadcf979558dc096df25f3b2f57622a62571b8836780c48f00989578c1d6ad7ee9f77dd7485115e7e221f5e245b43ae34ca
Static task
static1
Behavioral task
behavioral1
Sample
aaf528c6e9dcc6876871abd209ae90a8.exe
Resource
win7-20220414-en
Malware Config
Extracted
bitrat
1.38
connect.holix.de:8700
-
communication_password
2011af5a2285a618daf8125dd3fd296e
-
install_dir
Microsoft
-
install_file
SignatureUpdate.exe
-
tor_process
tor
Targets
-
-
Target
aaf528c6e9dcc6876871abd209ae90a8.exe
-
Size
3.8MB
-
MD5
aaf528c6e9dcc6876871abd209ae90a8
-
SHA1
9f6392d28cdf543b5508ce7e86f0dc26df53cc0c
-
SHA256
3d464460a5eca975b045bdf92d3cc2952047279a06a7d618c6ea2c8b66ddce2c
-
SHA512
11452d10f571800290880696695f4cadcf979558dc096df25f3b2f57622a62571b8836780c48f00989578c1d6ad7ee9f77dd7485115e7e221f5e245b43ae34ca
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
XMRig Miner Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-