General

  • Target

    873_93_517_PDF.iso

  • Size

    84KB

  • Sample

    221026-jsq57afag9

  • MD5

    fc10c3db52b32a19f0f290ed3d5a4e1f

  • SHA1

    90163f306be76591dc6d97d5beb85a041fc0d176

  • SHA256

    c15d24ee67dac39de91b5275a66ea506fc5ee1b24162b8ee9f5d5c9ccf6bc779

  • SHA512

    10a92d407a45f6452b7d2346102f3bda029564f8dd0b1cf3779006245859feb12d568df53247c270265c5a6a48addc1cd59175764dfb1dded350679d81291c6c

  • SSDEEP

    384:KGE2HMdudOHoRir1G/gJ6jX4hy7cySdI5P9mei8MwU/iUx8VWDCvqhms3h2wappi:Kl20v/xDDuwkuedmdVKBDhpA3T+RPvj

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bitone9090.duckdns.org:9090

Attributes
  • communication_password

    e10adc3949ba59abbe56e057f20f883e

  • tor_process

    tor

Targets

    • Target

      873_93_517_PDF.exe

    • Size

      23KB

    • MD5

      bf1cd9a3b9f4e67ccfd3a2a1e2942c0c

    • SHA1

      fb5249b0a315531d94bf4e73d2b9902b8a39e63f

    • SHA256

      6ed2e7b85f9591e922a95dbc167e5ed3ca2da2d3b823ed14aadc3eecdbddd5f0

    • SHA512

      5e219a2d85b36080a49079a97eb6aa4c5a4dc3290f0ed3e67134824b622d29fe72c3e58f8a2c6c41471d7c198250a29c101a6792eba628483a0052bfdf074cc7

    • SSDEEP

      384:+2HMdudOHoRir1G/gJ6jX4hy7cySdI5P9mei8MwU/iUx8VWDCvqhms3h2wappTut:+20v/xDDuwkuedmdVKBDhpA3T+RPvjG

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks