General

  • Target

    63e1c29b4c151caf92970fbaf8e0c2a7.bin

  • Size

    1.6MB

  • Sample

    230602-b6yheshc95

  • MD5

    7bb47c3c59c7f01b5d614fc0fd2a2856

  • SHA1

    db3fd4c9ae16c75886d0293ea613787831ad9ceb

  • SHA256

    dbb900a503cbf37481c821e1ca5e87e710c1ddafb22519afc502b9979ae14983

  • SHA512

    f79db081cb012c1dc7c256d18f1655ddd550eb5da3630a36132a611fab6faea17f96fd484333ac1b16999791ba182144e752587fdeee63ad72bd554c2259a25a

  • SSDEEP

    49152:W8elJHl5gdWd/1eoE6HZSlHC4FBVdFLw4kA9qU4:W8aJF5gw1etQZr4FBVHLw4kWq7

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

bitratluckshinjisix130.freeddns.org:7011

Attributes
  • communication_password

    71042e216840c2f1d480e868f387e8db

  • tor_process

    tor

Targets

    • Target

      719548921d3a99d8bf31d9c2d543803c0c39a620a8386f8ac557b7ebe5d024d2.exe

    • Size

      2.1MB

    • MD5

      63e1c29b4c151caf92970fbaf8e0c2a7

    • SHA1

      896386e7fd8d86ab3819598f4a549e61b919eee4

    • SHA256

      719548921d3a99d8bf31d9c2d543803c0c39a620a8386f8ac557b7ebe5d024d2

    • SHA512

      246d12288e1426b0aa0b53c69efa9fa80781ffdc4394b761ea35f4dae19618b20d7d80402d3edd5d258acbe69c6f8e4640d3d21ba460653383e1408d8d3d9a75

    • SSDEEP

      49152:GCO1NlTK6quyJYbwyi0UZTdA71QxlJOJ56eJwzG6hCF98v7:GJATVdA7WtOOeiv7

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks