General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa1JDd3Bpd0lmZmJYYnEwWEFHYnAydEpSMWtMZ3xBQ3Jtc0ttdEh4WnRUWmZCUVpPMVVMM01ob2dFTlFJSnloYkdtWGFOd0JCaGFFR3cwTms1RnctdUJXdmJhN1p1OFZVbDZycUtNTXdvakQzOGt4Rzl1MFgwRHhNUXpLWms0aVB3WjNPR3Q1Qmc4UG9sMjB5Z0dhcw&q=https%3A%2F%2Fanonfiles.com%2FR1Vebf30p4%2FDiscord_Spammer_rar&v=orNVCha9N2I

  • Sample

    230221-t5zm7shd8s

Malware Config

Extracted

Family

bitrat

Version

1.33

C2

179.43.140.170:8048

Attributes
  • communication_password

    6d42182cc168e65bffe35cf337ee3088

  • tor_process

    tor

Targets

    • Target

      https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa1JDd3Bpd0lmZmJYYnEwWEFHYnAydEpSMWtMZ3xBQ3Jtc0ttdEh4WnRUWmZCUVpPMVVMM01ob2dFTlFJSnloYkdtWGFOd0JCaGFFR3cwTms1RnctdUJXdmJhN1p1OFZVbDZycUtNTXdvakQzOGt4Rzl1MFgwRHhNUXpLWms0aVB3WjNPR3Q1Qmc4UG9sMjB5Z0dhcw&q=https%3A%2F%2Fanonfiles.com%2FR1Vebf30p4%2FDiscord_Spammer_rar&v=orNVCha9N2I

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Hidden Files and Directories

1
T1158

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks