Analysis
-
max time kernel
171s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 08:49
Behavioral task
behavioral1
Sample
13b9955a82f2f841c7257aaae32aedbd.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
13b9955a82f2f841c7257aaae32aedbd.exe
-
Size
1.4MB
-
MD5
13b9955a82f2f841c7257aaae32aedbd
-
SHA1
3dcd4c2296e8a649ca96d4c9df427bc64f3e346b
-
SHA256
313cf524faf4ea4d9cfeb6936cc5c093dd9290de92d5d2427e2f485ee8a7c9de
-
SHA512
ff572db2c190ed6fdfeda3426f8578cd4da309805dcd889d1196e2e9ed8f18a3873ac109a05cd35de1310b870c04ffc6f9f35203b9603b5ac829852582365cd5
-
SSDEEP
24576:QndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkzuXiLnLzHg:SXDFBU2iIBb0xY/6sUYYhXE3A
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
encrypted-channel.duckdns.org:443
Attributes
-
communication_password
fe2d38267c9396132e3c55d49af5b3f2
-
tor_process
tor
Signatures
-
resource yara_rule behavioral2/memory/4060-0-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4060-1-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4060-4-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4060-7-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4060-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4060-17-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4060 13b9955a82f2f841c7257aaae32aedbd.exe 4060 13b9955a82f2f841c7257aaae32aedbd.exe 4060 13b9955a82f2f841c7257aaae32aedbd.exe 4060 13b9955a82f2f841c7257aaae32aedbd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4060 13b9955a82f2f841c7257aaae32aedbd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4060 13b9955a82f2f841c7257aaae32aedbd.exe 4060 13b9955a82f2f841c7257aaae32aedbd.exe