General

  • Target

    ee321094b8da5433e4006e9630c7db9e.exe

  • Size

    7.8MB

  • Sample

    220722-yzzs8shgal

  • MD5

    ee321094b8da5433e4006e9630c7db9e

  • SHA1

    75934147c72f8f3ff4db06607b153689fd76f90b

  • SHA256

    902db07687a97742aa5aee6a87347a01d451939de8f022420438c73e86f96ad1

  • SHA512

    26a323c2de192f17c23bd96466326e78bc062b8761bc09635aa7c9c895b71e7c7e31bfb4e846c36a40953657125d52e38ec9e5254966e66a27def40f56e3d4dc

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

tcki6mrrcnrt33qy52viv7m64y6hepkv646nnzglrkbgytyt6b2hdrid.onion:80

Attributes
  • communication_password

    827ccb0eea8a706c4c34a16891f84e7b

  • tor_process

    dllhost

Targets

    • Target

      ee321094b8da5433e4006e9630c7db9e.exe

    • Size

      7.8MB

    • MD5

      ee321094b8da5433e4006e9630c7db9e

    • SHA1

      75934147c72f8f3ff4db06607b153689fd76f90b

    • SHA256

      902db07687a97742aa5aee6a87347a01d451939de8f022420438c73e86f96ad1

    • SHA512

      26a323c2de192f17c23bd96466326e78bc062b8761bc09635aa7c9c895b71e7c7e31bfb4e846c36a40953657125d52e38ec9e5254966e66a27def40f56e3d4dc

    Score
    9/10
    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Connection Proxy

1
T1090

Tasks