General

  • Target

    c3dc5d22fb3d36e7e228089398815e48

  • Size

    18KB

  • Sample

    220713-yxfbtadcf6

  • MD5

    c3dc5d22fb3d36e7e228089398815e48

  • SHA1

    4105b4bc7c6b368fe73a3d378fd669a6327f93b1

  • SHA256

    f96220adfda74917e800824560af98aa531b4c38f141ebb2582fe9925309814b

  • SHA512

    bb37c86ba694524f53905b21b80e0aa969c101954a9f773953f98368c115233549e284c1505c8e781bb44c49972a9fcce652fe6bf48f3b6ac5b6273f4d37c599

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bendecidobendiciones.con-ip.com:3005

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • tor_process

    tor

Targets

    • Target

      c3dc5d22fb3d36e7e228089398815e48

    • Size

      18KB

    • MD5

      c3dc5d22fb3d36e7e228089398815e48

    • SHA1

      4105b4bc7c6b368fe73a3d378fd669a6327f93b1

    • SHA256

      f96220adfda74917e800824560af98aa531b4c38f141ebb2582fe9925309814b

    • SHA512

      bb37c86ba694524f53905b21b80e0aa969c101954a9f773953f98368c115233549e284c1505c8e781bb44c49972a9fcce652fe6bf48f3b6ac5b6273f4d37c599

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

      suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks