General
-
Target
http://45.95.169.45:23205/
-
Sample
221121-1crkfsge79
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://45.95.169.45:23205/
Resource
win10v2004-20220812-en
windows10-2004-x64
14 signatures
300 seconds
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
45.95.168.128:23202
Attributes
-
communication_password
ed99c23d77796aac877ce1f91481dc28
-
install_dir
Oracle
-
install_file
java.exe
-
tor_process
tor
Targets
-
-
Target
http://45.95.169.45:23205/
Score10/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-