General

  • Target

    fd3822ff0c074b2d8f02973669525f3d.exe

  • Size

    3.8MB

  • Sample

    230119-ld7kqsfe88

  • MD5

    fd3822ff0c074b2d8f02973669525f3d

  • SHA1

    bf5620d5a11165575a48adea5ab6ef852bad5f33

  • SHA256

    7ed25ec70f54b43a85d83652b07b14d297530aa83d53eb777df0f20117bf612d

  • SHA512

    a6cd8a62217bc3ad7858703cef816e4bfbb3c85af061b00998a91aef4a37765e408f693698eb38936897b3c6b310442e3a8c8c026490dd7355c9cfb49c7b537d

  • SSDEEP

    98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/gmlwXVZ4FB:5+R/eZADUXR

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

executivemoney.ddns.net:897

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • install_dir

    chuka

  • install_file

    chromwin.exe

  • tor_process

    tor

Targets

    • Target

      fd3822ff0c074b2d8f02973669525f3d.exe

    • Size

      3.8MB

    • MD5

      fd3822ff0c074b2d8f02973669525f3d

    • SHA1

      bf5620d5a11165575a48adea5ab6ef852bad5f33

    • SHA256

      7ed25ec70f54b43a85d83652b07b14d297530aa83d53eb777df0f20117bf612d

    • SHA512

      a6cd8a62217bc3ad7858703cef816e4bfbb3c85af061b00998a91aef4a37765e408f693698eb38936897b3c6b310442e3a8c8c026490dd7355c9cfb49c7b537d

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/gmlwXVZ4FB:5+R/eZADUXR

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks