Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2022 16:40
Behavioral task
behavioral1
Sample
ctb.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ctb.exe
-
Size
1.4MB
-
MD5
4614702a90f570a0764605d800613545
-
SHA1
920c7eab63af0dde1410686a69100eeb0733aa03
-
SHA256
ca0e5c90261ae7ac2e46cd085ae31f1a1bfd7d7f030a6d33ba6a2cb280176ad1
-
SHA512
6e6077db88395f51fd2a434a742fa4da34fbcb0677f844510eab8008ff615008fe6a747c0e4a5f1754818eae11af47afa6cfeb1d334685eca485d4fb5dedbfc4
-
SSDEEP
24576:mndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkzZDEc:wXDFBU2iIBb0xY/6sUYYEH
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
bit100.accesscam.org:9090
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4532-132-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4532-135-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
ctb.exepid process 4532 ctb.exe 4532 ctb.exe 4532 ctb.exe 4532 ctb.exe 4532 ctb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ctb.exedescription pid process Token: SeShutdownPrivilege 4532 ctb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ctb.exepid process 4532 ctb.exe 4532 ctb.exe