General

  • Target

    54e5e90fbafdf6f051f2c89da50a4b95.exe

  • Size

    192KB

  • Sample

    221022-hcb6nabbf7

  • MD5

    54e5e90fbafdf6f051f2c89da50a4b95

  • SHA1

    f1e4459301f216cd4ff0bd27deb9d5a910ef9f5b

  • SHA256

    e4d62d22644bd8f7b85b47328cbac771dd76473902ac2a92cb3bb06ff7ed091a

  • SHA512

    a22ccbff0ff8da17a8a3a04f38f644b041b47e1c995b8b40b9a7ec4577c850439d244b966834f86d7ce6dd4ec3369ac11d9950429a3336b9b9c53095ea9b0b4b

  • SSDEEP

    1536:bB+R6Ywvj1k3w45lEdhKzoUSFeuiS2FIlKbz0PEziNQKjoa:tAwvj1Mw4shKzoUSFeuiS2FIIcwKoa

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

gh9st.mywire.org:5005

Attributes
  • communication_password

    803355ca422bf9b37bc523a750e21842

  • install_dir

    svcsvc

  • install_file

    svcsvc.exe

  • tor_process

    tor

Targets

    • Target

      54e5e90fbafdf6f051f2c89da50a4b95.exe

    • Size

      192KB

    • MD5

      54e5e90fbafdf6f051f2c89da50a4b95

    • SHA1

      f1e4459301f216cd4ff0bd27deb9d5a910ef9f5b

    • SHA256

      e4d62d22644bd8f7b85b47328cbac771dd76473902ac2a92cb3bb06ff7ed091a

    • SHA512

      a22ccbff0ff8da17a8a3a04f38f644b041b47e1c995b8b40b9a7ec4577c850439d244b966834f86d7ce6dd4ec3369ac11d9950429a3336b9b9c53095ea9b0b4b

    • SSDEEP

      1536:bB+R6Ywvj1k3w45lEdhKzoUSFeuiS2FIlKbz0PEziNQKjoa:tAwvj1Mw4shKzoUSFeuiS2FIIcwKoa

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • XenArmor Suite

      XenArmor is as suite of password recovery tools for various application.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks