General

  • Target

    d345138f48b7d610e4f7d280504a5a36

  • Size

    2.7MB

  • Sample

    240318-mfxc8afa9s

  • MD5

    d345138f48b7d610e4f7d280504a5a36

  • SHA1

    f4f24851b4249d37bcddebbe3a6084266f7dcf2a

  • SHA256

    f5fbd66fa754b518289e512f61ed872924ff06f80ec48dc08bd270b179d783cd

  • SHA512

    3e4fe2ad60059e1bfc696dfaeb1399c3a9c01ff44a6728fe6244dc7ebf27d18429c9e0e9b72a05727911ed6337eece15a242b8d5ce0d723350ad459772069c69

  • SSDEEP

    49152:6PbUDBy6zxsQZr5nGoL6DGrfTt5L5S2+F96XDumJBAwI8KSWBDfUHM6M6a/9K9zE:68r19k6SGeeKD9fUs6Fa/Y9zztzzK

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

dopeonlineforwarding.xyz:6620

Attributes
  • communication_password

    d74a214501c1c40b2c77e995082f3587

  • tor_process

    tor

Targets

    • Target

      d345138f48b7d610e4f7d280504a5a36

    • Size

      2.7MB

    • MD5

      d345138f48b7d610e4f7d280504a5a36

    • SHA1

      f4f24851b4249d37bcddebbe3a6084266f7dcf2a

    • SHA256

      f5fbd66fa754b518289e512f61ed872924ff06f80ec48dc08bd270b179d783cd

    • SHA512

      3e4fe2ad60059e1bfc696dfaeb1399c3a9c01ff44a6728fe6244dc7ebf27d18429c9e0e9b72a05727911ed6337eece15a242b8d5ce0d723350ad459772069c69

    • SSDEEP

      49152:6PbUDBy6zxsQZr5nGoL6DGrfTt5L5S2+F96XDumJBAwI8KSWBDfUHM6M6a/9K9zE:68r19k6SGeeKD9fUs6Fa/Y9zztzzK

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks