General

  • Target

    7bc04988ce8e7d3b9738ae0db7af487f

  • Size

    2.2MB

  • Sample

    240128-bepq7shgek

  • MD5

    7bc04988ce8e7d3b9738ae0db7af487f

  • SHA1

    0f2e73947facf7deae5baf93808122609b961cab

  • SHA256

    40ab356507ff2f9e22acd6a4360e8f42cf47fb1f352161d90a15bdad4a9f2e5f

  • SHA512

    22413f157eed0b616dc2bc200353a2a76bc607369232a7dc345784b4d46648dc85de1f3eca4e4a2bc5d949861dcd8d3c83f25d432624a031cfa52254d2bbc73c

  • SSDEEP

    49152:4UFVUFmXOoIlDP9jWHxh9x7xQWgofbCbDbBJpKXc1jGQj:4IN+nl79jgtnhzC/9JpKX0KQ

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

con.microgent.ru:6992

Attributes
  • communication_password

    760d1a76fde860fea97ca75974d2a4d1

  • tor_process

    tor

Targets

    • Target

      7bc04988ce8e7d3b9738ae0db7af487f

    • Size

      2.2MB

    • MD5

      7bc04988ce8e7d3b9738ae0db7af487f

    • SHA1

      0f2e73947facf7deae5baf93808122609b961cab

    • SHA256

      40ab356507ff2f9e22acd6a4360e8f42cf47fb1f352161d90a15bdad4a9f2e5f

    • SHA512

      22413f157eed0b616dc2bc200353a2a76bc607369232a7dc345784b4d46648dc85de1f3eca4e4a2bc5d949861dcd8d3c83f25d432624a031cfa52254d2bbc73c

    • SSDEEP

      49152:4UFVUFmXOoIlDP9jWHxh9x7xQWgofbCbDbBJpKXc1jGQj:4IN+nl79jgtnhzC/9JpKX0KQ

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks