General

  • Target

    024cde85d1a11c1b2e6749ec80b50fad

  • Size

    2.8MB

  • Sample

    231229-ylbjgsfahl

  • MD5

    024cde85d1a11c1b2e6749ec80b50fad

  • SHA1

    5f7226f27b0106f6050ce61d78e9c0fc8cfb8373

  • SHA256

    db5d4a5090c7303616f88db08a22abc975804ae1abdef9740c208c004648255b

  • SHA512

    5016d4eb26602300e49365186ce768026ac73927f41773883a6fc43376b622bc76a2d72d675cfa29224540cf82f8291a9ed03b0d5b762678d30b29f963ee7ccc

  • SSDEEP

    49152:KynUHNR9PKXUm1WHyilGSvn/5Kaq1rO5n8UXRaa/B03ak8JqFJ7BHKQk6j:KyUHNjSXUmIHy8Zv/Uaq1yJqak8JqbFR

Score
10/10

Malware Config

Targets

    • Target

      024cde85d1a11c1b2e6749ec80b50fad

    • Size

      2.8MB

    • MD5

      024cde85d1a11c1b2e6749ec80b50fad

    • SHA1

      5f7226f27b0106f6050ce61d78e9c0fc8cfb8373

    • SHA256

      db5d4a5090c7303616f88db08a22abc975804ae1abdef9740c208c004648255b

    • SHA512

      5016d4eb26602300e49365186ce768026ac73927f41773883a6fc43376b622bc76a2d72d675cfa29224540cf82f8291a9ed03b0d5b762678d30b29f963ee7ccc

    • SSDEEP

      49152:KynUHNR9PKXUm1WHyilGSvn/5Kaq1rO5n8UXRaa/B03ak8JqFJ7BHKQk6j:KyUHNjSXUmIHy8Zv/Uaq1yJqak8JqbFR

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks