General

  • Target

    a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362

  • Size

    3.8MB

  • Sample

    240229-nzj3nsge43

  • MD5

    dc04de40710a567639589c5688a6b5d9

  • SHA1

    9bd0e4360fe361962ebddb1d9b6451d99039f3c1

  • SHA256

    a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362

  • SHA512

    66c242aa1be30e47d3c7c9f3f15b9c042eab845aaa36f423c42a3683308aab294821bb8b61e7f5ed6d9fb0423350c659924bcd4610bebbb046e84b74ecb3c7d6

  • SSDEEP

    98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/DmlwXVZ4FB:5+R/eZADUXR

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

6.tcp.ngrok.io:13541

Attributes
  • communication_password

    92bfd6a529206b093c6840483e63902a

  • install_dir

    Google

  • install_file

    svchost.exe

  • tor_process

    tor

Targets

    • Target

      a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362

    • Size

      3.8MB

    • MD5

      dc04de40710a567639589c5688a6b5d9

    • SHA1

      9bd0e4360fe361962ebddb1d9b6451d99039f3c1

    • SHA256

      a733221129b17200bb1e364275116016429904433fea87fab0a3f95433676362

    • SHA512

      66c242aa1be30e47d3c7c9f3f15b9c042eab845aaa36f423c42a3683308aab294821bb8b61e7f5ed6d9fb0423350c659924bcd4610bebbb046e84b74ecb3c7d6

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/DmlwXVZ4FB:5+R/eZADUXR

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks