General

  • Target

    ddc3e1356b7807146d75a4eee20f96dd.exe

  • Size

    1.9MB

  • Sample

    221022-h1hcksbfap

  • MD5

    ddc3e1356b7807146d75a4eee20f96dd

  • SHA1

    7499a3593d4308a2208c01e766fddbf93954c61e

  • SHA256

    d76d0c80f55b69dc7c4622a3166d4b7a170c28e939bc052e11fcbdb056ef1239

  • SHA512

    250e6b7816d000a40bb272a274490325a59a87dce55b9705b65ef4e9f7c81344b93a4c2bf5125f23928f81c36231645197efcaa266c79dc07e2cf44fbf996663

  • SSDEEP

    49152:GzSJh0i1ZvjqB0LNlFRx9BWcWIqEBddvw:GgjvjqQR5WcWIqab

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

gh9st.mywire.org:5005

Attributes
  • communication_password

    803355ca422bf9b37bc523a750e21842

  • install_dir

    svcsvc

  • install_file

    svcsvc.exe

  • tor_process

    tor

Targets

    • Target

      ddc3e1356b7807146d75a4eee20f96dd.exe

    • Size

      1.9MB

    • MD5

      ddc3e1356b7807146d75a4eee20f96dd

    • SHA1

      7499a3593d4308a2208c01e766fddbf93954c61e

    • SHA256

      d76d0c80f55b69dc7c4622a3166d4b7a170c28e939bc052e11fcbdb056ef1239

    • SHA512

      250e6b7816d000a40bb272a274490325a59a87dce55b9705b65ef4e9f7c81344b93a4c2bf5125f23928f81c36231645197efcaa266c79dc07e2cf44fbf996663

    • SSDEEP

      49152:GzSJh0i1ZvjqB0LNlFRx9BWcWIqEBddvw:GgjvjqQR5WcWIqab

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks