General

  • Target

    importante boleta cita fisca.exe

  • Size

    112KB

  • Sample

    220630-vptyfsdddl

  • MD5

    9af009465f81dd21e95c471f1cfcd4cb

  • SHA1

    46a82157ffff18e722ec9bd9c6563b2daea7f05a

  • SHA256

    f8740b5ac23ccea3c9041197ea5a63e2afdbd83515155cfc5567fba9b4ea434e

  • SHA512

    3473591a4ae75f57859de9609ca0e16c9283b7ffcb603b29d410208a39fff1ce3d3284c3105b0d9062d1ba33a1e90029cbd72f07f3bad74820fe9b625aba8935

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

ejuejehth.con-ip.com:1880

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • tor_process

    tor

Targets

    • Target

      importante boleta cita fisca.exe

    • Size

      112KB

    • MD5

      9af009465f81dd21e95c471f1cfcd4cb

    • SHA1

      46a82157ffff18e722ec9bd9c6563b2daea7f05a

    • SHA256

      f8740b5ac23ccea3c9041197ea5a63e2afdbd83515155cfc5567fba9b4ea434e

    • SHA512

      3473591a4ae75f57859de9609ca0e16c9283b7ffcb603b29d410208a39fff1ce3d3284c3105b0d9062d1ba33a1e90029cbd72f07f3bad74820fe9b625aba8935

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks