General

  • Target

    3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d

  • Size

    3.8MB

  • Sample

    240229-lvt1zadf97

  • MD5

    23c77d427c009060cc6aaa23f2898b67

  • SHA1

    3a0b484c87b7ece658176060c080e1504d7f9ae4

  • SHA256

    3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d

  • SHA512

    ef0c37c02465ab89f5b957b05afe0e0ea62de6f2f1ad4f877fa20cd5f723e955eff22a579379970cb9e7b8deff98d0446a4c33ea7c4c8ea219512902695293ba

  • SSDEEP

    98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/bmlwXVZ4FB:5+R/eZADUXR

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

pvstub.ddns.net:43763

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • install_dir

    MSCrypt

  • install_file

    brclient2.exe

  • tor_process

    tor

Targets

    • Target

      3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d

    • Size

      3.8MB

    • MD5

      23c77d427c009060cc6aaa23f2898b67

    • SHA1

      3a0b484c87b7ece658176060c080e1504d7f9ae4

    • SHA256

      3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d

    • SHA512

      ef0c37c02465ab89f5b957b05afe0e0ea62de6f2f1ad4f877fa20cd5f723e955eff22a579379970cb9e7b8deff98d0446a4c33ea7c4c8ea219512902695293ba

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/bmlwXVZ4FB:5+R/eZADUXR

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks