General

  • Target

    8645_30_321_PDF.exe

  • Size

    300.0MB

  • Sample

    221103-vshdtsfbbp

  • MD5

    b77a44c24d6afbeec6bf3fc7a89eef38

  • SHA1

    9c956f05e4d77353c9da0fa34ce83b9603458b68

  • SHA256

    03fecf2c72e71174940f6b7b31887155ce0f92e3af5f95ed323af83b1ca9814f

  • SHA512

    b9d70c2dd353f6ffcb5e1442d4c93c4afb0c3d762c718b97d87a4b2726e93992f7ad3c046d778b3823bfd289ad1d26e56228838fd8f86425298e96acdfc079c9

  • SSDEEP

    49152:65yqSeXRXNTeuzSMGSQvGMQGWcR4XkKodV9SMAOeZWjUvJ2GR6bcRhOPD5U6:65yqlXRXteg54GEdCPLOt4B2K6br5

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bit9090.duckdns.org:9090

bitone9090.duckdns.org:9090

Attributes
  • communication_password

    e10adc3949ba59abbe56e057f20f883e

  • tor_process

    tor

Targets

    • Target

      8645_30_321_PDF.exe

    • Size

      300.0MB

    • MD5

      b77a44c24d6afbeec6bf3fc7a89eef38

    • SHA1

      9c956f05e4d77353c9da0fa34ce83b9603458b68

    • SHA256

      03fecf2c72e71174940f6b7b31887155ce0f92e3af5f95ed323af83b1ca9814f

    • SHA512

      b9d70c2dd353f6ffcb5e1442d4c93c4afb0c3d762c718b97d87a4b2726e93992f7ad3c046d778b3823bfd289ad1d26e56228838fd8f86425298e96acdfc079c9

    • SSDEEP

      49152:65yqSeXRXNTeuzSMGSQvGMQGWcR4XkKodV9SMAOeZWjUvJ2GR6bcRhOPD5U6:65yqlXRXteg54GEdCPLOt4B2K6br5

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

System Information Discovery

1
T1082

Tasks