General

  • Target

    bdd9e7f08c0201a33241054eba30df948f4712463d306879a3f40ed4e82d2d93

  • Size

    3.8MB

  • Sample

    240229-q2hnqsbc85

  • MD5

    9601fd942d9f38ebb7908a390be2d485

  • SHA1

    fd5778d86dc0af782533abee1711a89be58e1c35

  • SHA256

    bdd9e7f08c0201a33241054eba30df948f4712463d306879a3f40ed4e82d2d93

  • SHA512

    55e90810c9cc7fe5018ab60d0f68a2cd0653665e5cc6501d2c69b42779495f17e9ed30da45a99a8675398e67eb6a4ba80390da48e784a31dfdb96b88f6d19c06

  • SSDEEP

    98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/JmlwXVZ4FB:5+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

backu4734.duckdns.org:7904

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • tor_process

    tor

Targets

    • Target

      bdd9e7f08c0201a33241054eba30df948f4712463d306879a3f40ed4e82d2d93

    • Size

      3.8MB

    • MD5

      9601fd942d9f38ebb7908a390be2d485

    • SHA1

      fd5778d86dc0af782533abee1711a89be58e1c35

    • SHA256

      bdd9e7f08c0201a33241054eba30df948f4712463d306879a3f40ed4e82d2d93

    • SHA512

      55e90810c9cc7fe5018ab60d0f68a2cd0653665e5cc6501d2c69b42779495f17e9ed30da45a99a8675398e67eb6a4ba80390da48e784a31dfdb96b88f6d19c06

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/JmlwXVZ4FB:5+R/eZADUXR

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Tasks