General

  • Target

    stub.exe

  • Size

    3.8MB

  • Sample

    230525-z4y8yadb2z

  • MD5

    8ee8f36cfddbb4aeb1388191cfca4e90

  • SHA1

    742516898c7ba788f889c2a3438a37a354524577

  • SHA256

    a1d460867b08cc04ecf499c53f72acd1ac2ae4a0d28ea72bdc2b7a8a0a99b704

  • SHA512

    d84fdac4f0afb9e3e2eb13a14f4753e992ebadc00f1ad87bcf44a7fb41e38b282db7280d8fa9d9c829ce3a314688ca013566d57c3d3ec51c4a3f068e7e65c5b6

  • SSDEEP

    98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/dmlwXVZ4FB:5+R/eZADUXR

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

soon-lp.at.ply.gg:17209

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • install_dir

    C:\ProgramData

  • install_file

    Bit

  • tor_process

    tor

Targets

    • Target

      stub.exe

    • Size

      3.8MB

    • MD5

      8ee8f36cfddbb4aeb1388191cfca4e90

    • SHA1

      742516898c7ba788f889c2a3438a37a354524577

    • SHA256

      a1d460867b08cc04ecf499c53f72acd1ac2ae4a0d28ea72bdc2b7a8a0a99b704

    • SHA512

      d84fdac4f0afb9e3e2eb13a14f4753e992ebadc00f1ad87bcf44a7fb41e38b282db7280d8fa9d9c829ce3a314688ca013566d57c3d3ec51c4a3f068e7e65c5b6

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/dmlwXVZ4FB:5+R/eZADUXR

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks