Malware Analysis Report

2025-01-03 05:02

Sample ID 240101-lmeajsfgdn
Target 1e1a9db7ece5e5259814b06f7f9ba139.exe
SHA256 19fb5be33cb4ffcf1a5d8ec4e9c1b10ba6bd91c3310bb658c319d564ace9acac
Tags
bitrat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

19fb5be33cb4ffcf1a5d8ec4e9c1b10ba6bd91c3310bb658c319d564ace9acac

Threat Level: Known bad

The file 1e1a9db7ece5e5259814b06f7f9ba139.exe was found to be: Known bad.

Malicious Activity Summary

bitrat trojan upx

BitRAT

UPX packed file

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-01 09:38

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-01 09:38

Reported

2024-01-06 04:39

Platform

win7-20231129-en

Max time kernel

64s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe"

Signatures

BitRAT

trojan bitrat

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe

"C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe"

C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe

"C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe"

C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe

"C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\enkRsXDxZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFFB3.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 dreamz.duckdns.org udp
US 156.96.154.89:62316 dreamz.duckdns.org tcp
US 156.96.154.89:62316 dreamz.duckdns.org tcp
US 8.8.8.8:53 dreamz.duckdns.org udp
US 156.96.154.89:62316 dreamz.duckdns.org tcp

Files

memory/2360-0-0x00000000010F0000-0x000000000131E000-memory.dmp

memory/2360-1-0x0000000074810000-0x0000000074EFE000-memory.dmp

memory/2360-2-0x0000000000FC0000-0x0000000001000000-memory.dmp

memory/2360-3-0x00000000004D0000-0x00000000004E8000-memory.dmp

memory/2360-4-0x0000000074810000-0x0000000074EFE000-memory.dmp

memory/2360-5-0x0000000000FC0000-0x0000000001000000-memory.dmp

memory/2360-6-0x00000000084B0000-0x00000000086A0000-memory.dmp

memory/2360-7-0x000000000BC90000-0x000000000BE06000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpFFB3.tmp

MD5 86e9c407fbc4c61d5887ec741fff2faf
SHA1 e3f8315501bc0d06c99f13c7dd7b657f4f0d594d
SHA256 54cdd1f49dfc4d98eab177957da338d59345bf2cae1781d015d44b666a9060ab
SHA512 a7642b6f7f82cbbbcc14854b3d0d3383b5c27c62070269b22bba1d4a0aa7eedc738b0d129a3e6e0a9a30622d7bb12d02076fd5c370c76144e39ab1e148a29eb5

memory/2500-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2500-24-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2360-23-0x0000000074810000-0x0000000074EFE000-memory.dmp

memory/2500-22-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-21-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-20-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-19-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-15-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-14-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-13-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-25-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-28-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-32-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-30-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-26-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-27-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-33-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-34-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-35-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2500-36-0x0000000000400000-0x00000000007E4000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-01 09:38

Reported

2024-01-06 04:39

Platform

win10v2004-20231215-en

Max time kernel

65s

Max time network

134s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe"

Signatures

BitRAT

trojan bitrat

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe

"C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe"

C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe

"C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe"

C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe

"C:\Users\Admin\AppData\Local\Temp\1e1a9db7ece5e5259814b06f7f9ba139.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\enkRsXDxZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4987.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 dreamz.duckdns.org udp
US 156.96.154.89:62316 dreamz.duckdns.org tcp
US 8.8.8.8:53 udp
GB 96.16.110.41:443 tcp
IE 20.123.104.105:443 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 4.231.128.59:443 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 40.127.169.103:443 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 20.73.194.208:443 tcp
US 8.8.8.8:53 udp
N/A 20.166.126.56:443 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 40.127.169.103:443 tcp
N/A 40.127.169.103:443 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 88.221.134.18:80 tcp
N/A 20.73.194.208:443 tcp
N/A 20.73.194.208:443 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 dreamz.duckdns.org udp
US 8.8.8.8:53 udp
GB 96.16.110.114:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 156.96.154.89:62316 dreamz.duckdns.org tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 dreamz.duckdns.org udp
US 156.96.154.89:62316 dreamz.duckdns.org tcp

Files

memory/5000-2-0x0000000005430000-0x00000000054CC000-memory.dmp

memory/5000-3-0x0000000005A80000-0x0000000006024000-memory.dmp

memory/5000-4-0x0000000005570000-0x0000000005602000-memory.dmp

memory/5000-5-0x00000000057C0000-0x00000000057D0000-memory.dmp

memory/5000-6-0x00000000054F0000-0x00000000054FA000-memory.dmp

memory/5000-7-0x0000000005700000-0x0000000005756000-memory.dmp

memory/5000-0-0x0000000000830000-0x0000000000A5E000-memory.dmp

memory/5000-1-0x0000000074EA0000-0x0000000075650000-memory.dmp

memory/5000-8-0x00000000058F0000-0x0000000005908000-memory.dmp

memory/5000-9-0x0000000074EA0000-0x0000000075650000-memory.dmp

memory/5000-10-0x00000000057C0000-0x00000000057D0000-memory.dmp

memory/5000-11-0x0000000008530000-0x0000000008720000-memory.dmp

memory/5000-12-0x000000000BCB0000-0x000000000BE26000-memory.dmp

memory/4572-18-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-23-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/5000-24-0x0000000074EA0000-0x0000000075650000-memory.dmp

memory/4572-22-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-20-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-19-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-25-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-26-0x0000000074DB0000-0x0000000074DE9000-memory.dmp

memory/4572-30-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-32-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-34-0x0000000075150000-0x0000000075189000-memory.dmp

memory/4572-33-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-31-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-29-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-28-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-27-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-35-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-37-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-38-0x0000000075150000-0x0000000075189000-memory.dmp

memory/4572-36-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-40-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4572-41-0x0000000075150000-0x0000000075189000-memory.dmp

memory/4572-39-0x0000000000400000-0x00000000007E4000-memory.dmp