General

  • Target

    cafb7d353313362efa3d09e9a4345c681bba522185870ceb930216d54ffe00c8.exe

  • Size

    733KB

  • Sample

    221102-pzbxqscfdm

  • MD5

    4f7199a3cf8228b7a1ea06157e033f1f

  • SHA1

    9c3dc25dc1baf8bea180d0ef6cdc7ecc19de3b5d

  • SHA256

    cafb7d353313362efa3d09e9a4345c681bba522185870ceb930216d54ffe00c8

  • SHA512

    3be7a80b373c81fc16637ad99ec84d185c3e2bb3e60c540f0dd60fbe1c85407caaf1ec2993a1114856a466fdb3763132e5d501bb5d8f16c179bad91322294d7e

  • SSDEEP

    12288:vE8us5hZIRFFRs4nmHQqtZua/3RvWEmhj+wzhd:MJ8ZIRFFRPnmDzuUmYYh

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

winery.nsupdate.info:5877

Attributes
  • communication_password

    e5ff7c52fb3501484ea7ca8641803415

  • tor_process

    tor

Targets

    • Target

      cafb7d353313362efa3d09e9a4345c681bba522185870ceb930216d54ffe00c8.exe

    • Size

      733KB

    • MD5

      4f7199a3cf8228b7a1ea06157e033f1f

    • SHA1

      9c3dc25dc1baf8bea180d0ef6cdc7ecc19de3b5d

    • SHA256

      cafb7d353313362efa3d09e9a4345c681bba522185870ceb930216d54ffe00c8

    • SHA512

      3be7a80b373c81fc16637ad99ec84d185c3e2bb3e60c540f0dd60fbe1c85407caaf1ec2993a1114856a466fdb3763132e5d501bb5d8f16c179bad91322294d7e

    • SSDEEP

      12288:vE8us5hZIRFFRs4nmHQqtZua/3RvWEmhj+wzhd:MJ8ZIRFFRPnmDzuUmYYh

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Tasks