General

  • Target

    d07c08290689248188b042deb5b2ad4a

  • Size

    5.3MB

  • Sample

    240317-k3k8csbe4t

  • MD5

    d07c08290689248188b042deb5b2ad4a

  • SHA1

    4133960e895c920676cb9814d17bcc2b30f6b0cc

  • SHA256

    531cf457b7e9c07b5dc10396da6df17ca83e2a7edda26e81cc6a39a2f49a9f11

  • SHA512

    84a31927996c06fdb4dd732121367998d5f159dc9e4244a3f26ff0a2b6c2e0c5d23df81a8b3c78473482be3f9b7677cc9b62f3d654d9dac60fd5acc72b656cc0

  • SSDEEP

    98304:jx/5k12AomWEm2qGI6+vJkE/AHo5CAF7OaqyvJzTauzputHQfVvYfI75xita:j95lQm2xw1AHo599OaBRzTaulwwtKI

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

omeno.duckdns.org:5867

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Targets

    • Target

      d07c08290689248188b042deb5b2ad4a

    • Size

      5.3MB

    • MD5

      d07c08290689248188b042deb5b2ad4a

    • SHA1

      4133960e895c920676cb9814d17bcc2b30f6b0cc

    • SHA256

      531cf457b7e9c07b5dc10396da6df17ca83e2a7edda26e81cc6a39a2f49a9f11

    • SHA512

      84a31927996c06fdb4dd732121367998d5f159dc9e4244a3f26ff0a2b6c2e0c5d23df81a8b3c78473482be3f9b7677cc9b62f3d654d9dac60fd5acc72b656cc0

    • SSDEEP

      98304:jx/5k12AomWEm2qGI6+vJkE/AHo5CAF7OaqyvJzTauzputHQfVvYfI75xita:j95lQm2xw1AHo599OaBRzTaulwwtKI

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks