General

  • Target

    stub.exe

  • Size

    3.8MB

  • Sample

    230417-pm286aeb66

  • MD5

    d5cad087973fab0104f92810bbf16871

  • SHA1

    ced93e48beea62c6e444cdb8ae5ea2fbed72085d

  • SHA256

    0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9

  • SHA512

    1497f30f44a9adfe1496ccc1dc5befe4736bf32e0862102b5a39ca6caadaa1f35023bc8d33ea88cbafd6962e07a92faa49d3a4c0e9e0e192c7f5829ca63ddd8b

  • SSDEEP

    98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/JmlwXVZ4FB:5+R/eZADUXR

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

soon-lp.at.ply.gg:17209

Attributes
  • communication_password

    33d47f3d76b1b6a91406c01ef0ce5164

  • install_dir

    BIRAT

  • install_file

    svchost

  • tor_process

    Tls_Connect

Targets

    • Target

      stub.exe

    • Size

      3.8MB

    • MD5

      d5cad087973fab0104f92810bbf16871

    • SHA1

      ced93e48beea62c6e444cdb8ae5ea2fbed72085d

    • SHA256

      0a3d2686f9f3df3a943578869afa5b87e249dbcb41a1752626ba8948445fe1e9

    • SHA512

      1497f30f44a9adfe1496ccc1dc5befe4736bf32e0862102b5a39ca6caadaa1f35023bc8d33ea88cbafd6962e07a92faa49d3a4c0e9e0e192c7f5829ca63ddd8b

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/JmlwXVZ4FB:5+R/eZADUXR

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks