General
-
Target
50e9bf9968b7f69589d62bbc142317b2
-
Size
1.0MB
-
Sample
220706-zq3dfahaep
-
MD5
50e9bf9968b7f69589d62bbc142317b2
-
SHA1
71dfb1e986e43e8ef1778dd61c8598eb41f86bb4
-
SHA256
a753bbd6f71744fdb1b18dac452d67f8f8a4a3010c0a5e940814a4baa904c75b
-
SHA512
ca922d2a8d008d6146b751fc22c88d3b9ed2277c4f94be90ce052b707e254ff31c35f180dbbc600b36d4b82d32a6bf5a62aae0625a310c85fec5bd58a5e4be74
Static task
static1
Behavioral task
behavioral1
Sample
50e9bf9968b7f69589d62bbc142317b2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
50e9bf9968b7f69589d62bbc142317b2.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
bitrat
1.38
jehovaesmipastor.con-ip.com:3005
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Targets
-
-
Target
50e9bf9968b7f69589d62bbc142317b2
-
Size
1.0MB
-
MD5
50e9bf9968b7f69589d62bbc142317b2
-
SHA1
71dfb1e986e43e8ef1778dd61c8598eb41f86bb4
-
SHA256
a753bbd6f71744fdb1b18dac452d67f8f8a4a3010c0a5e940814a4baa904c75b
-
SHA512
ca922d2a8d008d6146b751fc22c88d3b9ed2277c4f94be90ce052b707e254ff31c35f180dbbc600b36d4b82d32a6bf5a62aae0625a310c85fec5bd58a5e4be74
Score10/10-
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-