Analysis

  • max time kernel
    174s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 10:38

General

  • Target

    a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe

  • Size

    3.8MB

  • MD5

    34205fbcec076217e2c64ba7611c176d

  • SHA1

    e9bb8988e27694913e53ecb39a28581b1972798e

  • SHA256

    a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5

  • SHA512

    4780690315a244938d5f8a5e8650445cbe49f29a2d90a5c73c7281bc021c5361f14229b65621c12c2b5c5cdc000cca094ed53f63540f7f5acd2d277af611528f

  • SSDEEP

    49152:zXUIEeZzdeh/c7p1rNdd+JNEj0ykdj21x1YhFlX4bA/Hg/11VzeLG/7wqNKB2VIx:zXrEeZzdhjuV/gd1VzsGUqNKTHvQeM6

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.35

C2

103.89.91.38:3390

Attributes
  • communication_password

    827ccb0eea8a706c4c34a16891f84e7b

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe
    "C:\Users\Admin\AppData\Local\Temp\a62fe97a7a3e6f419cedafbe6681f202237c8dc03ecbdf2b5ce3df951675f7f5.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1728-0-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1728-1-0x00000000744E0000-0x0000000074519000-memory.dmp
    Filesize

    228KB

  • memory/1728-2-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/1728-3-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/1728-4-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/1728-5-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/1728-6-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/1728-7-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/1728-8-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/1728-9-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/1728-10-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB