General

  • Target

    e60399a0e9761e7653376e878875ef3a_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240407-2jl4zsgg64

  • MD5

    e60399a0e9761e7653376e878875ef3a

  • SHA1

    a2d96bbe0837fcb7a1057e69c8b77960a81ae2b9

  • SHA256

    881003326302ab243f71138e2e39517677c9117fd73e50f8989ee9b39e86407b

  • SHA512

    5226acef95bcc436f5a7d75bb9888fa6cc1bb2cc7638ebde597fd3e75c155eae029dae6dfb4223cddbcc5a31e4d402e8d88e97eaed83e9adc73ee4265b306264

  • SSDEEP

    24576:aGAASJ+e1ne+6Iyc0mauZEpTZIc1h9A+1TcVDka13/n/nMFaWaiEpwqnyGpXS28X:xAALe8+68auZuZ6SMJPIaoE2qne28X

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

185.250.148.54:4898

Attributes
  • communication_password

    5e868314c93c46157fbd5b1adce630ff

  • tor_process

    tor

Targets

    • Target

      e60399a0e9761e7653376e878875ef3a_JaffaCakes118

    • Size

      1.7MB

    • MD5

      e60399a0e9761e7653376e878875ef3a

    • SHA1

      a2d96bbe0837fcb7a1057e69c8b77960a81ae2b9

    • SHA256

      881003326302ab243f71138e2e39517677c9117fd73e50f8989ee9b39e86407b

    • SHA512

      5226acef95bcc436f5a7d75bb9888fa6cc1bb2cc7638ebde597fd3e75c155eae029dae6dfb4223cddbcc5a31e4d402e8d88e97eaed83e9adc73ee4265b306264

    • SSDEEP

      24576:aGAASJ+e1ne+6Iyc0mauZEpTZIc1h9A+1TcVDka13/n/nMFaWaiEpwqnyGpXS28X:xAALe8+68auZuZ6SMJPIaoE2qne28X

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks