General

  • Target

    897c493548dd9537dc52dccbcd65373b86ffcef1285befaa88a252b8475a32a1.exe

  • Size

    12KB

  • Sample

    221208-nt2erscg9s

  • MD5

    a2bf963447678bc8e50ae4be3200a2d4

  • SHA1

    f5ab9610c07d20b09b04ae45423ab7e3c1953241

  • SHA256

    897c493548dd9537dc52dccbcd65373b86ffcef1285befaa88a252b8475a32a1

  • SHA512

    6cccec003d0fb435b4698a83a7c0631afee395ce6b9e7730ac23d9878d2e409a89de39f0de770c7cf046960d4bd5997007391ed98090683de9ccf852618a23a6

  • SSDEEP

    192:rWvUwdeu5ILftAEl5IObSW0VlO1TTgJMRqIcuuuH:roNILfuSIyqlqTEKR

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

37.139.128.233:3569

Attributes
  • communication_password

    ce952068942604a6d6df06ed5002fad6

  • tor_process

    tor

Targets

    • Target

      897c493548dd9537dc52dccbcd65373b86ffcef1285befaa88a252b8475a32a1.exe

    • Size

      12KB

    • MD5

      a2bf963447678bc8e50ae4be3200a2d4

    • SHA1

      f5ab9610c07d20b09b04ae45423ab7e3c1953241

    • SHA256

      897c493548dd9537dc52dccbcd65373b86ffcef1285befaa88a252b8475a32a1

    • SHA512

      6cccec003d0fb435b4698a83a7c0631afee395ce6b9e7730ac23d9878d2e409a89de39f0de770c7cf046960d4bd5997007391ed98090683de9ccf852618a23a6

    • SSDEEP

      192:rWvUwdeu5ILftAEl5IObSW0VlO1TTgJMRqIcuuuH:roNILfuSIyqlqTEKR

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks