General

  • Target

    order details.exe

  • Size

    23KB

  • Sample

    221111-mbyqgshc3y

  • MD5

    fd4af8f83ebc315989406a87ca804dba

  • SHA1

    d482a554d978b86a4886b14c97176c1a3b66174f

  • SHA256

    770e60bd6058174717ddc4fd4c194579acd9012d792aa912bcc217ff99bcf17d

  • SHA512

    164c2f7e28e35c406e29fd3dad7de7b9bc43648615ca7edbcff182b2355f6681c74e04e31562ad214e54ef0a90afbd03dfe4baeee3941ea5ee8ba91528a6ffca

  • SSDEEP

    384:uqchetLLQQ5kVOdCvyh77WlWqVDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDyd+:Yk99clq7WlWqVDDDDDDDDDDDDDDDDDD6

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

103.125.190.185:1234

Attributes
  • communication_password

    827ccb0eea8a706c4c34a16891f84e7b

  • tor_process

    tor

Targets

    • Target

      order details.exe

    • Size

      23KB

    • MD5

      fd4af8f83ebc315989406a87ca804dba

    • SHA1

      d482a554d978b86a4886b14c97176c1a3b66174f

    • SHA256

      770e60bd6058174717ddc4fd4c194579acd9012d792aa912bcc217ff99bcf17d

    • SHA512

      164c2f7e28e35c406e29fd3dad7de7b9bc43648615ca7edbcff182b2355f6681c74e04e31562ad214e54ef0a90afbd03dfe4baeee3941ea5ee8ba91528a6ffca

    • SSDEEP

      384:uqchetLLQQ5kVOdCvyh77WlWqVDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDyd+:Yk99clq7WlWqVDDDDDDDDDDDDDDDDDD6

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks