General

  • Target

    a0d576575c443902f50ba9dbf937e3a7.bin

  • Size

    1.8MB

  • Sample

    240226-cnspwsba7t

  • MD5

    fbe018def76336b47cf8eed3863a3668

  • SHA1

    885e7deff94ef0fb972a1f4414062af2af541df6

  • SHA256

    3cdb1939b469a82ac1b4b9dfb1cb506fabebfed1f95d9ead6d7428b9d909804c

  • SHA512

    1c8e2552a933b5d5b38143f87ff4fd37fda680eaa86806867c9196bbc6e59af8b7185b62dc2b8c7d840ff3780753c6516d711c906fdb4a91b992bc51962395e7

  • SSDEEP

    49152:AtLI8lpepYkwx3MQp1d9X6VvCYWjNgh8OU9GH:ANIoepYkMc6dwpWBghQ8

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

87.98.177.182:3131

Attributes
  • communication_password

    3c3662bcb661d6de679c636744c66b62

  • tor_process

    tls

Targets

    • Target

      1d80fee1f9266fe2738f514614449d5dedb2374293e7489ec54d61c7d5634bac.exe

    • Size

      3.8MB

    • MD5

      a0d576575c443902f50ba9dbf937e3a7

    • SHA1

      2a0c612e172e19f8da5115c5c0fb5bd9c6bd9a1f

    • SHA256

      1d80fee1f9266fe2738f514614449d5dedb2374293e7489ec54d61c7d5634bac

    • SHA512

      326b276400d6703c5416b506f5e36e63c30c282765bb3bd730c20d0697277400f90855a7301e4a278db79b6c6126a417fd964047508d4fe4a7d85883d96c2f50

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/dmlwXVZ4FB:5+R/eZADUXR

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Tasks