General

  • Target

    8924a53be46439d1c258a10b59596b77

  • Size

    3.0MB

  • Sample

    231219-yjqkmahhg4

  • MD5

    8924a53be46439d1c258a10b59596b77

  • SHA1

    6cf13347e475772a66e67f5f529a908956dfd00d

  • SHA256

    08b44be5d6721d2b20fa1de5fa8d1f80d84d9d424f6fefc06b01a9a81670aec8

  • SHA512

    b322d44280e7eff437d0c429f6cfd7af7cf05ea0a8598a9dd42a89b1b6712a1c5f80f1a676d7e1eaf71188f82b68e5c32078e3b376efea97c81df2d594b8eeab

  • SSDEEP

    49152:YJXZRkXRxWCBu72E76E5jXVL5w9lmVOALga7n0Yy:Ky

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

194.33.45.3:4898

Attributes
  • communication_password

    89ec00ac3524ab4f7edd70785d23e302

  • tor_process

    tor

Targets

    • Target

      8924a53be46439d1c258a10b59596b77

    • Size

      3.0MB

    • MD5

      8924a53be46439d1c258a10b59596b77

    • SHA1

      6cf13347e475772a66e67f5f529a908956dfd00d

    • SHA256

      08b44be5d6721d2b20fa1de5fa8d1f80d84d9d424f6fefc06b01a9a81670aec8

    • SHA512

      b322d44280e7eff437d0c429f6cfd7af7cf05ea0a8598a9dd42a89b1b6712a1c5f80f1a676d7e1eaf71188f82b68e5c32078e3b376efea97c81df2d594b8eeab

    • SSDEEP

      49152:YJXZRkXRxWCBu72E76E5jXVL5w9lmVOALga7n0Yy:Ky

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks