General

  • Target

    c658e1813220fae5b834f939c5592f123f61cfe579b23530f5a85d3efb0d6fd3

  • Size

    3.8MB

  • Sample

    240229-nrczdsff8s

  • MD5

    cd6ad9475054da49ce915eeb82ee2c59

  • SHA1

    97b32eb078278f094e3f42f0b6acb27015c9c31c

  • SHA256

    c658e1813220fae5b834f939c5592f123f61cfe579b23530f5a85d3efb0d6fd3

  • SHA512

    d1ed4f99b04b74bbe5fe34484599b60f64f3a1a7c9bdb35ba5bcc5afcfa83c30512d103d030c2c04559a81718248ab8cf3cc8daee112dd3c7a5c885e8f5d90b1

  • SSDEEP

    98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/nmlwXVZ4FB:5+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

888myrat.duckdns.org:5000

Attributes
  • communication_password

    ce765aceecc693824d31cf88da0b4d69

  • tor_process

    tor

Targets

    • Target

      c658e1813220fae5b834f939c5592f123f61cfe579b23530f5a85d3efb0d6fd3

    • Size

      3.8MB

    • MD5

      cd6ad9475054da49ce915eeb82ee2c59

    • SHA1

      97b32eb078278f094e3f42f0b6acb27015c9c31c

    • SHA256

      c658e1813220fae5b834f939c5592f123f61cfe579b23530f5a85d3efb0d6fd3

    • SHA512

      d1ed4f99b04b74bbe5fe34484599b60f64f3a1a7c9bdb35ba5bcc5afcfa83c30512d103d030c2c04559a81718248ab8cf3cc8daee112dd3c7a5c885e8f5d90b1

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/nmlwXVZ4FB:5+R/eZADUXR

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Tasks