Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-10-2023 07:01
Behavioral task
behavioral1
Sample
download (1).exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
download (1).exe
-
Size
1.4MB
-
MD5
724ca9a00c8266522af8922f2449d511
-
SHA1
89855de33e0e3ceb5a1c75de82e7480670da59c2
-
SHA256
10043243d95cc27b223c3d6a669346a3994f7b5b5a1530fb6b8d4c98b94e9fe1
-
SHA512
40eebf2b0d22ecdf40e3ee54ce243bf7501488f8098dc1185823d95a41388f55232aaf86400256dd3b3fa245221fc3b233813a33697dc7c6c0e2ccd52952de6f
-
SSDEEP
24576:andRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkzDVc6vdtF:cXDFBU2iIBb0xY/6sUYYKVlV/
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
bitrat9300.duckdns.org:9300
Attributes
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Signatures
-
resource yara_rule behavioral1/memory/2152-0-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-3-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-4-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-7-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-8-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-9-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-10-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-11-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-13-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-14-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-15-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-16-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-17-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-18-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2152-19-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2152 download (1).exe 2152 download (1).exe 2152 download (1).exe 2152 download (1).exe 2152 download (1).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2152 download (1).exe Token: SeShutdownPrivilege 2152 download (1).exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2152 download (1).exe 2152 download (1).exe