General

  • Target

    8f695447f315aae26536f653ea034987_JaffaCakes118

  • Size

    5.0MB

  • Sample

    240402-r3jg4add79

  • MD5

    8f695447f315aae26536f653ea034987

  • SHA1

    acc82b2769ce1eeb5b49678a9c71dc8d046af122

  • SHA256

    5676b8e02ff5e2ed7ca6b07d32967250fc7d00bb5fb027ef624bf3676320f14f

  • SHA512

    a114ac4877bfb7123d6d4957abca577c0143935543a385c8bce803532faa8393d05cd38d1bc99d6f317c4a08768ad9ecf1a759281cc9f8103c2c5f4fbeb6ba55

  • SSDEEP

    98304:JOA2Ns9JXyYQlivimkQ+9vmwOMVoyd6+q/0M078XQgL:rusz2lCimkQYmwm+q/fQ

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

6.tcp.ngrok.io:10724

Attributes
  • communication_password

    2ececd0e63e498b6f7514044265f451c

  • tor_process

    tor

Targets

    • Target

      8f695447f315aae26536f653ea034987_JaffaCakes118

    • Size

      5.0MB

    • MD5

      8f695447f315aae26536f653ea034987

    • SHA1

      acc82b2769ce1eeb5b49678a9c71dc8d046af122

    • SHA256

      5676b8e02ff5e2ed7ca6b07d32967250fc7d00bb5fb027ef624bf3676320f14f

    • SHA512

      a114ac4877bfb7123d6d4957abca577c0143935543a385c8bce803532faa8393d05cd38d1bc99d6f317c4a08768ad9ecf1a759281cc9f8103c2c5f4fbeb6ba55

    • SSDEEP

      98304:JOA2Ns9JXyYQlivimkQ+9vmwOMVoyd6+q/0M078XQgL:rusz2lCimkQYmwm+q/fQ

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks