General

  • Target

    21f894391eaac76010275132312ac5c8.exe

  • Size

    1.4MB

  • Sample

    220817-gs6vjabdfm

  • MD5

    21f894391eaac76010275132312ac5c8

  • SHA1

    c2f20f6d6a8881ddd0ac04f9d87a11d2e9a817f3

  • SHA256

    bec7f761c529f547e16cc2867fd6bf96bd0e6a6740d70da8c57789fdbb71f9b3

  • SHA512

    7cdd5fdfb40027a6c6fd5a6dbb0621a29dd183d318be6d203bca51b699c3e26219a4910cfc1ceaaa2183103577eb86e1fb84426e6b8a6f07127abb72bf36244e

  • SSDEEP

    24576:bndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkz7In5x4ZY:TXDFBU2iIBb0xY/6sUYY7n5b

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

trotox.duckdns.org:55441

Attributes
  • communication_password

    4b49ee1f55b1900518dfb23fd2d7c702

  • tor_process

    tor

Targets

    • Target

      21f894391eaac76010275132312ac5c8.exe

    • Size

      1.4MB

    • MD5

      21f894391eaac76010275132312ac5c8

    • SHA1

      c2f20f6d6a8881ddd0ac04f9d87a11d2e9a817f3

    • SHA256

      bec7f761c529f547e16cc2867fd6bf96bd0e6a6740d70da8c57789fdbb71f9b3

    • SHA512

      7cdd5fdfb40027a6c6fd5a6dbb0621a29dd183d318be6d203bca51b699c3e26219a4910cfc1ceaaa2183103577eb86e1fb84426e6b8a6f07127abb72bf36244e

    • SSDEEP

      24576:bndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkz7In5x4ZY:TXDFBU2iIBb0xY/6sUYY7n5b

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks