General

  • Target

    6289079cb5fa0cbc3e98fb7c4a69155d

  • Size

    5.2MB

  • Sample

    240117-np3r2afac8

  • MD5

    6289079cb5fa0cbc3e98fb7c4a69155d

  • SHA1

    80af04f716ad02dc07ea43181e46cb99fdbc95d9

  • SHA256

    fb377b9a5e8404274db97b99551194d6dc6abd4f458655f465d188a8a330330a

  • SHA512

    3b9078b366c439625783a4291d5a9ff0e36339f2c25d5246da76572e3d3b05828258b9668d4145720536c3345dbfd37671f92665514218eb1379fc55f59a3049

  • SSDEEP

    98304:Qxyb3xbpku0fAJogbq1EJsgrAz/ET0mgta+lhNx2lVdoN8bx1tngazZoCzZIRQ39:QUbxmu0Ipbn2jEYa6hf9NybxtAa6J

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

omeno.duckdns.org:5867

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Targets

    • Target

      6289079cb5fa0cbc3e98fb7c4a69155d

    • Size

      5.2MB

    • MD5

      6289079cb5fa0cbc3e98fb7c4a69155d

    • SHA1

      80af04f716ad02dc07ea43181e46cb99fdbc95d9

    • SHA256

      fb377b9a5e8404274db97b99551194d6dc6abd4f458655f465d188a8a330330a

    • SHA512

      3b9078b366c439625783a4291d5a9ff0e36339f2c25d5246da76572e3d3b05828258b9668d4145720536c3345dbfd37671f92665514218eb1379fc55f59a3049

    • SSDEEP

      98304:Qxyb3xbpku0fAJogbq1EJsgrAz/ET0mgta+lhNx2lVdoN8bx1tngazZoCzZIRQ39:QUbxmu0Ipbn2jEYa6hf9NybxtAa6J

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks