General

  • Target

    0b085b6c06aa7651a9f82d166a35d4e5e2a47a434e14650b1ad339505dec6c8c

  • Size

    76KB

  • Sample

    220719-kl1lqahdd3

  • MD5

    b616f155025298921bf61464c733c6b8

  • SHA1

    9d37971350aa557835efe927f06085ae3a14fa79

  • SHA256

    0b085b6c06aa7651a9f82d166a35d4e5e2a47a434e14650b1ad339505dec6c8c

  • SHA512

    c4ab0b0ebc398de2e714104255a51a899d78e2a3e1f9ae1fbc99b830ab73d61a83057430f8599f3654867fc7053747bed00b8147fc618734bdfb29c8e9c9cda4

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

sangredecristo.con-ip.com:3005

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • tor_process

    tor

Targets

    • Target

      0b085b6c06aa7651a9f82d166a35d4e5e2a47a434e14650b1ad339505dec6c8c

    • Size

      76KB

    • MD5

      b616f155025298921bf61464c733c6b8

    • SHA1

      9d37971350aa557835efe927f06085ae3a14fa79

    • SHA256

      0b085b6c06aa7651a9f82d166a35d4e5e2a47a434e14650b1ad339505dec6c8c

    • SHA512

      c4ab0b0ebc398de2e714104255a51a899d78e2a3e1f9ae1fbc99b830ab73d61a83057430f8599f3654867fc7053747bed00b8147fc618734bdfb29c8e9c9cda4

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks