General

  • Target

    DOCUMENTO PARA AUTORIZAR.exe

  • Size

    3.9MB

  • Sample

    220818-pd1zqshcd4

  • MD5

    20488b3900a42a7bbdd61f3a19e369a1

  • SHA1

    d5d9140b955120dcbb3e8af34b568330afa1ac4c

  • SHA256

    91a3c004d88d116d189b401b53d5d99cb4296a026c26619418d4a5aeb4791f65

  • SHA512

    530305af3380f8842a28b18d6bbc37a31c0c176047c498ea7de2c59585ee8b6ec9fe9d005f2ef0eeade329e7020c87445491b6d948db08e9412f0841f7f99393

  • SSDEEP

    98304:6zh3Rx4LtfTfuWlWlUXq/2Rgmp19SvRaHuFVN:6zRWLb0lUa/2HeRSu1

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

uwegcujwhbc.con-ip.com:1880

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • tor_process

    tor

Targets

    • Target

      DOCUMENTO PARA AUTORIZAR.exe

    • Size

      3.9MB

    • MD5

      20488b3900a42a7bbdd61f3a19e369a1

    • SHA1

      d5d9140b955120dcbb3e8af34b568330afa1ac4c

    • SHA256

      91a3c004d88d116d189b401b53d5d99cb4296a026c26619418d4a5aeb4791f65

    • SHA512

      530305af3380f8842a28b18d6bbc37a31c0c176047c498ea7de2c59585ee8b6ec9fe9d005f2ef0eeade329e7020c87445491b6d948db08e9412f0841f7f99393

    • SSDEEP

      98304:6zh3Rx4LtfTfuWlWlUXq/2Rgmp19SvRaHuFVN:6zRWLb0lUa/2HeRSu1

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks