General

  • Target

    f4c06b5a5e05514eae99a568da52d486cec115eceeff1b814217e60b845c0592

  • Size

    5.5MB

  • Sample

    221130-q9mmnaac6s

  • MD5

    ac699cd9c851cca2acf025657c5792f0

  • SHA1

    1afe48edc49e018329e35a4d8ffb543bee488a3f

  • SHA256

    f4c06b5a5e05514eae99a568da52d486cec115eceeff1b814217e60b845c0592

  • SHA512

    116bb93e95cc03d4b803c2cace8bcf45f47a44e4315cc24f9710509ec1078eb4d4679b13054d94fe6b0c74c833c8c681339739554d96220364991b383396d886

  • SSDEEP

    98304:lVHhjviEClQVdlu3YmBZULTSGMxsBFlml+HRCfgfWQVn4yovjh2YSCSFe:PBjKEvjWYmBCKhmBDeMCSWQVn4y62YSM

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.34

C2

185.157.162.234:54262

Attributes
  • communication_password

    2bb232c0b13c774965ef8558f0fbd615

  • tor_process

    tor

Targets

    • Target

      f4c06b5a5e05514eae99a568da52d486cec115eceeff1b814217e60b845c0592

    • Size

      5.5MB

    • MD5

      ac699cd9c851cca2acf025657c5792f0

    • SHA1

      1afe48edc49e018329e35a4d8ffb543bee488a3f

    • SHA256

      f4c06b5a5e05514eae99a568da52d486cec115eceeff1b814217e60b845c0592

    • SHA512

      116bb93e95cc03d4b803c2cace8bcf45f47a44e4315cc24f9710509ec1078eb4d4679b13054d94fe6b0c74c833c8c681339739554d96220364991b383396d886

    • SSDEEP

      98304:lVHhjviEClQVdlu3YmBZULTSGMxsBFlml+HRCfgfWQVn4yovjh2YSCSFe:PBjKEvjWYmBCKhmBDeMCSWQVn4y62YSM

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks