General

  • Target

    BE1FD5FE836A13BB666BAC30A8E5B71DB41736EE0E8786B110754607E0FE5B79

  • Size

    1.4MB

  • Sample

    221208-ye6q2seb31

  • MD5

    1d52daa10afd3d91cdc5ca4d7edc35b9

  • SHA1

    0e5b0a9188676288a590b534e8b8c057f969a1b0

  • SHA256

    be1fd5fe836a13bb666bac30a8e5b71db41736ee0e8786b110754607e0fe5b79

  • SHA512

    a593025f34b7190eb42b49bf8d84efe804093a1552370edaf002c9596103e21b72cd9564ef16d5ea561cdf4a2c2da149eb72db894888d6c0fd563919d7ff2b23

  • SSDEEP

    12288:dSj5lclcaywFMtTPWQOQSJU3FtJlpCBIUQZC8fRuHT6Kk/RqIkr:dSVKFp6rfn/VXPCyE8fMuqI

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

winery.nsupdate.info:5877

Attributes
  • communication_password

    e5ff7c52fb3501484ea7ca8641803415

  • tor_process

    tor

Targets

    • Target

      ERA_1.EXE

    • Size

      862KB

    • MD5

      84bf18cdc14d7e2c5311ff6cd071a0dc

    • SHA1

      a784ef5651e7e1530d4e77ab9f7f3507b51d9e67

    • SHA256

      f53107b892a50e33ff130e01cf391a2b69524dbe09b75cc13192365bbd6eda11

    • SHA512

      97434045c4c0c4d82296c668ec01a8ae31a9eee9bfba7db6f2d314f1574d3ee950b6a7566a0faa313a1e396541dff76be4cedac8d96bd342ed8783d1f7dc4c0d

    • SSDEEP

      12288:fSj5lclcaywFMtTPWQOQSJU3FtJlpCBIUQZC8fRuHT6Kk/RqIkr:fSVKFp6rfn/VXPCyE8fMuqI

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks