General

  • Target

    8284376593.zip

  • Size

    3.0MB

  • Sample

    221028-xdkxhsagf3

  • MD5

    4dfde9cce16ce9045d44755965b6f08d

  • SHA1

    f955aead55ba45715e46b92f73860c42e7824d09

  • SHA256

    21f85f8178a2de0bf2e29e7cf9d1e1f63920b2d14823c0ad0dc9ee5b3d199156

  • SHA512

    39bae6391a4befaee7d2cacbe9c733176ebdff462bcf843222787350673e1e3d9da38d096db15bd5b7a4c3cda992b66eb471c718bd034e2869ff6515ea7fe9d3

  • SSDEEP

    49152:0KnU+O5U8PwJfWc5vcUXpF/KUqX6DglpugpcHfpA38EQwB5pUqG9Wvpsjda23MEV:m+O5jYJHvXpFyUqXqocWQwNDveJHCDRo

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bitone9090.duckdns.org:9090

Attributes
  • communication_password

    e10adc3949ba59abbe56e057f20f883e

  • tor_process

    tor

Targets

    • Target

      938374740_PDF.exe

    • Size

      300.0MB

    • MD5

      91de6f0d77d97cbf756d6b5e2c29b573

    • SHA1

      3895e4fdae53ace4cc7514a1c4866464d04d52f3

    • SHA256

      b64ecd4756874ec0df90e539ae373ab6bff4d7801be63fe2a51389119cf6251d

    • SHA512

      bc689c4a0f3fc7261df147bf34f8a437637ce7990dbc108ed6ed3ac73b7f93eb944e6af29216aedb1f64b54b163a91d1e0b602b70963c44ff143ee48f5338b0b

    • SSDEEP

      49152:SbmoBeVPECiSWEKMjBBy2dKsThqnR1UUUUUJUUUUUU:+BQiSZNBy2MUUUUUJUUUUUU

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks