General

  • Target

    8595837976.zip

  • Size

    5KB

  • Sample

    221215-rhecmsce47

  • MD5

    b5ff1a74bb21b26828c5b589fa29c3b2

  • SHA1

    06bc0eabe0db136575d2f3d9bfa49664f8f680df

  • SHA256

    6f8188ae7ae8a5b3e3803ba7ff59bb2b5394bd990fa042ff8a4564f060989e27

  • SHA512

    5debf74e5222cf6839164dcc1b5da3c10d5e05ec8ad7e86f93d8952f0fcd9f03a97863f35f1dcdd997dc3cd9b3875b519448656ace4a53170f67d7529a16e939

  • SSDEEP

    96:cpDkrTmnayrFr0jzF9UFEn8wyb01vnC0kd7qyUOYilWxqaMz8gtMAxWAxeZKVwqh:UOYrFQF9UKK0NEde5O0xRngRxWSe0zh

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

37.139.128.233:3569

Attributes
  • communication_password

    ce952068942604a6d6df06ed5002fad6

  • tor_process

    tor

Targets

    • Target

      5011f03924e939955dd3868c86998398ce022fb726ec701921377bf13ea341a2

    • Size

      13KB

    • MD5

      a1a52e047f098572bc4f1020cbe19970

    • SHA1

      f3b05c953cc2d459985e47f41609620cb4c59437

    • SHA256

      5011f03924e939955dd3868c86998398ce022fb726ec701921377bf13ea341a2

    • SHA512

      3a5914dc3655b53dcb36fbaf18ad170029c15933e4a9c0808a3c95179da6bff246a10dcf5cc048392dff988dc2ba3bde6f89f3a1ab9914b8c3535a95c8f70699

    • SSDEEP

      192:6ZYUc8f/ftGgkpErlc/vl20JFi1TTgJMRqIcuuufNva:6ZddGgkpSWxuTEKRdN

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • XenArmor Suite

      XenArmor is as suite of password recovery tools for various application.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks