Resubmissions

12-11-2022 16:17

221112-trfyyagf53 10

12-11-2022 16:00

221112-tfm8wage94 10

General

  • Target

    statement_docx.exe

  • Size

    1.7MB

  • Sample

    221112-trfyyagf53

  • MD5

    2aedd0caff110812c17de4072cde09ba

  • SHA1

    a2850f291012d07ef1acedbb9ac24884fb8db8d0

  • SHA256

    9f38198ca55e984bd65f7a324853411d19a3426ac0455f64b76eb3aa2c1d85e8

  • SHA512

    b83a5576522d128fe9ad5d9e579403fb96b69afef97a4440527c9e534e998bb38537bcb6fb64eddc7ca7ca92385621b0a48bc90abb2854c6f504211084d540e0

  • SSDEEP

    49152:cSJ9EoE2fT7om1nLbta4BN/0yLhsLZNhONEIwS:cc1PxBLGtNENBwS

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

celesperial.ddns.net:5200

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Targets

    • Target

      statement_docx.exe

    • Size

      1.7MB

    • MD5

      2aedd0caff110812c17de4072cde09ba

    • SHA1

      a2850f291012d07ef1acedbb9ac24884fb8db8d0

    • SHA256

      9f38198ca55e984bd65f7a324853411d19a3426ac0455f64b76eb3aa2c1d85e8

    • SHA512

      b83a5576522d128fe9ad5d9e579403fb96b69afef97a4440527c9e534e998bb38537bcb6fb64eddc7ca7ca92385621b0a48bc90abb2854c6f504211084d540e0

    • SSDEEP

      49152:cSJ9EoE2fT7om1nLbta4BN/0yLhsLZNhONEIwS:cc1PxBLGtNENBwS

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks