General

  • Target

    8d9dfc0971be7360a5edb4152a085eec

  • Size

    5.2MB

  • Sample

    231222-pz4mraafgn

  • MD5

    8d9dfc0971be7360a5edb4152a085eec

  • SHA1

    cd86740a05e8424179c9d9c72569441884e32f99

  • SHA256

    8c6def7156f6454a1808ed54b64cad4a73a6b3436e865c24093c30867521dfd1

  • SHA512

    1eece4d23e978e572e75a521bee3601f116405a60215e4f3a884df7c1b5ccd417512fe14fed324ca314d3503ebe5ffe34a06b34ea81bfc184e825fe8537ae3c9

  • SSDEEP

    98304:46fqvmOYd4PtLqYjoVYX4ozPeto3kvm+bsmIm2cUEKtUqvSC4GTOBehy51gK:40pOYAtdoWooCSiZl2zE8vSC4y

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

omeno.duckdns.org:5867

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Targets

    • Target

      8d9dfc0971be7360a5edb4152a085eec

    • Size

      5.2MB

    • MD5

      8d9dfc0971be7360a5edb4152a085eec

    • SHA1

      cd86740a05e8424179c9d9c72569441884e32f99

    • SHA256

      8c6def7156f6454a1808ed54b64cad4a73a6b3436e865c24093c30867521dfd1

    • SHA512

      1eece4d23e978e572e75a521bee3601f116405a60215e4f3a884df7c1b5ccd417512fe14fed324ca314d3503ebe5ffe34a06b34ea81bfc184e825fe8537ae3c9

    • SSDEEP

      98304:46fqvmOYd4PtLqYjoVYX4ozPeto3kvm+bsmIm2cUEKtUqvSC4GTOBehy51gK:40pOYAtdoWooCSiZl2zE8vSC4y

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks