General

  • Target

    edc6fc03fcae70ce049633e7462df1f4_JaffaCakes118

  • Size

    2.5MB

  • Sample

    240411-s6kp1aef52

  • MD5

    edc6fc03fcae70ce049633e7462df1f4

  • SHA1

    4358cbebe4ee45f4e78264399b901c459e42ef4b

  • SHA256

    15da7fc578a4c9d29717b19b4d5b604e08307810752fdf63d27335ba3171bbaa

  • SHA512

    8fe766ca10aa43e782b6a30511fa01d05e27f4d344bd0f69a02d91de3b1697e9743d7682a5b86e8949cf1ed763ac32467b25d71fb18ae458d6f12ddc8d0bbcef

  • SSDEEP

    49152:yH4ZbyZHYr3nsDW7fOFpLHRoN7Thvl9HAMcZ182dhMbYt6Ku+C:kZms0GFYZl9Hq42+I6N

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

37.0.11.183:4444

Attributes
  • communication_password

    5f4dcc3b5aa765d61d8327deb882cf99

  • tor_process

    tor

Targets

    • Target

      edc6fc03fcae70ce049633e7462df1f4_JaffaCakes118

    • Size

      2.5MB

    • MD5

      edc6fc03fcae70ce049633e7462df1f4

    • SHA1

      4358cbebe4ee45f4e78264399b901c459e42ef4b

    • SHA256

      15da7fc578a4c9d29717b19b4d5b604e08307810752fdf63d27335ba3171bbaa

    • SHA512

      8fe766ca10aa43e782b6a30511fa01d05e27f4d344bd0f69a02d91de3b1697e9743d7682a5b86e8949cf1ed763ac32467b25d71fb18ae458d6f12ddc8d0bbcef

    • SSDEEP

      49152:yH4ZbyZHYr3nsDW7fOFpLHRoN7Thvl9HAMcZ182dhMbYt6Ku+C:kZms0GFYZl9Hq42+I6N

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks