General

  • Target

    1e1a9db7ece5e5259814b06f7f9ba139

  • Size

    2.2MB

  • Sample

    231230-141mfaacbn

  • MD5

    1e1a9db7ece5e5259814b06f7f9ba139

  • SHA1

    77695fe6b9b671f002f46caa62c764c4ffb258de

  • SHA256

    19fb5be33cb4ffcf1a5d8ec4e9c1b10ba6bd91c3310bb658c319d564ace9acac

  • SHA512

    41e0a04bb06c64b60333d53e80c3d71b694706769d9d274d5b82d1dd54e0f7eb6c750d11c313765dcfc76e044086da44191e093b0b7ab95d5e8c4e843abe84e8

  • SSDEEP

    49152:KH////////////////////6/////////////////////3////Y////////N//Cy/:KH////////////////////6////////K

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

dreamz.duckdns.org:62316

Attributes
  • communication_password

    1272400d0db0daaed4a2fee0ec7878d3

  • tor_process

    tor

Targets

    • Target

      1e1a9db7ece5e5259814b06f7f9ba139

    • Size

      2.2MB

    • MD5

      1e1a9db7ece5e5259814b06f7f9ba139

    • SHA1

      77695fe6b9b671f002f46caa62c764c4ffb258de

    • SHA256

      19fb5be33cb4ffcf1a5d8ec4e9c1b10ba6bd91c3310bb658c319d564ace9acac

    • SHA512

      41e0a04bb06c64b60333d53e80c3d71b694706769d9d274d5b82d1dd54e0f7eb6c750d11c313765dcfc76e044086da44191e093b0b7ab95d5e8c4e843abe84e8

    • SSDEEP

      49152:KH////////////////////6/////////////////////3////Y////////N//Cy/:KH////////////////////6////////K

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks