General

  • Target

    c1eecde902cf9ae57bf9a0e1e25032e6

  • Size

    3.8MB

  • Sample

    240311-3ypn4acb75

  • MD5

    c1eecde902cf9ae57bf9a0e1e25032e6

  • SHA1

    0e373286f2da046c6912f25160e0912496d02d84

  • SHA256

    0b6efdd0f3f4dddee58af21631051999c5e9d7968a3ba2e7a34388c42375a457

  • SHA512

    011c171342593527c0259015376a96026c2d0cb6be2734d5b09a0a0aba4f2ff0641c9df2a67cb29a7ae193fbe1358d2e00a0125da9e449939973c680e6b96624

  • SSDEEP

    98304:877Pmq33rE/JDLPWZADUGer7B6iY74M/HmlwXVZaFB:K+R/eZADUXR

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

microupdate.securitytactics.com:9999

Attributes
  • communication_password

    d9909824688daaad46d441eefd81eb38

  • install_dir

    Solitare

  • install_file

    NRT.exe

  • tor_process

    tor

Targets

    • Target

      c1eecde902cf9ae57bf9a0e1e25032e6

    • Size

      3.8MB

    • MD5

      c1eecde902cf9ae57bf9a0e1e25032e6

    • SHA1

      0e373286f2da046c6912f25160e0912496d02d84

    • SHA256

      0b6efdd0f3f4dddee58af21631051999c5e9d7968a3ba2e7a34388c42375a457

    • SHA512

      011c171342593527c0259015376a96026c2d0cb6be2734d5b09a0a0aba4f2ff0641c9df2a67cb29a7ae193fbe1358d2e00a0125da9e449939973c680e6b96624

    • SSDEEP

      98304:877Pmq33rE/JDLPWZADUGer7B6iY74M/HmlwXVZaFB:K+R/eZADUXR

    Score
    6/10
    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks