General

  • Target

    Zapitvane_MACH_BULGARIA_EOOD_09_2023.doc

  • Size

    199KB

  • Sample

    230914-smrn7sch3z

  • MD5

    3b92906782599469acffd05ba041942e

  • SHA1

    522183445616d131f3edf13e6ea93c9f19c9f52f

  • SHA256

    edce16eadba8d19990b2ff2e97420f07c1f4defe813ffe961f9cd777f8368b7b

  • SHA512

    c1f8a1259327db79f98467d2a9e2dce172c39e78541476722863eb7b6fa5c39f41c39ad574e7e0b65ed4ab0d8a7201665df1463f2aeaa2d456634c94e71e0f33

  • SSDEEP

    3072:NAN+svPwMrFoXiURMf8yS/TSTIs6sCbMD3itIm0QqgxJi+m:W33JodRU8yS/dLsZDyp0QZC

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

185.225.75.68:3569

Attributes
  • communication_password

    0edcbe7d888380c49e7d1dcf67b6ea6e

  • tor_process

    tor

Targets

    • Target

      Zapitvane_MACH_BULGARIA_EOOD_09_2023.doc

    • Size

      199KB

    • MD5

      3b92906782599469acffd05ba041942e

    • SHA1

      522183445616d131f3edf13e6ea93c9f19c9f52f

    • SHA256

      edce16eadba8d19990b2ff2e97420f07c1f4defe813ffe961f9cd777f8368b7b

    • SHA512

      c1f8a1259327db79f98467d2a9e2dce172c39e78541476722863eb7b6fa5c39f41c39ad574e7e0b65ed4ab0d8a7201665df1463f2aeaa2d456634c94e71e0f33

    • SSDEEP

      3072:NAN+svPwMrFoXiURMf8yS/TSTIs6sCbMD3itIm0QqgxJi+m:W33JodRU8yS/dLsZDyp0QZC

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks