General
-
Target
88992f8dbb079ae5f9754ed265c02f55.exe
-
Size
1.4MB
-
Sample
220627-stlfrscbdm
-
MD5
88992f8dbb079ae5f9754ed265c02f55
-
SHA1
c05d4025024da67569c53afabbdda51dabae6521
-
SHA256
9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c
-
SHA512
83e02f354a883fa35431b86e41c875e4b3ba4664ab60eb677273bda514b079a9d075a51c1c933106a2c3da330ac22599a4a4ecfaac4dc62a8f41806d698ed911
Behavioral task
behavioral1
Sample
88992f8dbb079ae5f9754ed265c02f55.exe
Resource
win7-20220414-en
Malware Config
Extracted
bitrat
1.38
wer89.duckdns.org:2222
-
communication_password
653d716345d8915046b904b90f41f271
-
tor_process
tor
Targets
-
-
Target
88992f8dbb079ae5f9754ed265c02f55.exe
-
Size
1.4MB
-
MD5
88992f8dbb079ae5f9754ed265c02f55
-
SHA1
c05d4025024da67569c53afabbdda51dabae6521
-
SHA256
9288f5f8898d70977cd45f6527ada3a36bdb76ae7accb3401b9c84189f18cc2c
-
SHA512
83e02f354a883fa35431b86e41c875e4b3ba4664ab60eb677273bda514b079a9d075a51c1c933106a2c3da330ac22599a4a4ecfaac4dc62a8f41806d698ed911
-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-