General

  • Target

    Order #115-46CYP-6543893216.exe

  • Size

    391KB

  • Sample

    220825-rnzkrsfag8

  • MD5

    e89986dbfdef6f38249ad35a87d93f33

  • SHA1

    6c78e1cb8b361c4dba18451a12d42901c0a97ca1

  • SHA256

    9c457ce3eb5b5b0456c80609b512040696acab4f47d7b6879f0200e1b8501075

  • SHA512

    02188eaeb964750e666c9aff416d4a93d88a7d5f887d8c6a73066629f2f0ed101ee4ecb135a19664f83aeebf8ae0b7c40d177d3c34bc422c8b73f9c55d046e0b

  • SSDEEP

    6144:xXifTDZUEd5UT2AyvSlKkl8ftbFq65LhhZMEUcQQiW:ADj9Nv0K5tbFq6xh8W

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

febbit2.ddns.net:6655

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Targets

    • Target

      Order #115-46CYP-6543893216.exe

    • Size

      391KB

    • MD5

      e89986dbfdef6f38249ad35a87d93f33

    • SHA1

      6c78e1cb8b361c4dba18451a12d42901c0a97ca1

    • SHA256

      9c457ce3eb5b5b0456c80609b512040696acab4f47d7b6879f0200e1b8501075

    • SHA512

      02188eaeb964750e666c9aff416d4a93d88a7d5f887d8c6a73066629f2f0ed101ee4ecb135a19664f83aeebf8ae0b7c40d177d3c34bc422c8b73f9c55d046e0b

    • SSDEEP

      6144:xXifTDZUEd5UT2AyvSlKkl8ftbFq65LhhZMEUcQQiW:ADj9Nv0K5tbFq6xh8W

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Downloads MZ/PE file

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks