General

  • Target

    ClientCrack.exe

  • Size

    296KB

  • Sample

    230613-xzjlksba28

  • MD5

    bc5462da689944a5426fa4d933dc5fdf

  • SHA1

    8a6ab3b4ed020b4d3b60d4aa4251d2f51f5d6308

  • SHA256

    d8276830ad97867bf13dc04ae0190e2c3dbcb14c08b5fe30e609ef817b110ca3

  • SHA512

    35abd0160381c6c16a011ce77d8abc8d5545e1dc9ea2928e4074b9967f97404cbe134b4d3acd90dd8ff9ff2e7f86cf57678d800c975650b6f7176347e5952cf7

  • SSDEEP

    6144:NMH4eWseynVKsxUthS/nOS2J0zx9F4/Gksi+4CeeTf8X8FQ1M:NMH4sn81Par0019F4/GkudRTf8SQ1M

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

elensias.duckdns.org:0

Attributes
  • communication_password

    56c82ccd658e09e829f16bb99457bcbc

  • install_dir

    gnugnu

  • install_file

    chorme.exe

  • tor_process

    tori

Targets

    • Target

      ClientCrack.exe

    • Size

      296KB

    • MD5

      bc5462da689944a5426fa4d933dc5fdf

    • SHA1

      8a6ab3b4ed020b4d3b60d4aa4251d2f51f5d6308

    • SHA256

      d8276830ad97867bf13dc04ae0190e2c3dbcb14c08b5fe30e609ef817b110ca3

    • SHA512

      35abd0160381c6c16a011ce77d8abc8d5545e1dc9ea2928e4074b9967f97404cbe134b4d3acd90dd8ff9ff2e7f86cf57678d800c975650b6f7176347e5952cf7

    • SSDEEP

      6144:NMH4eWseynVKsxUthS/nOS2J0zx9F4/Gksi+4CeeTf8X8FQ1M:NMH4sn81Par0019F4/GkudRTf8SQ1M

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks