General

  • Target

    0e9ea036cc3d12ebf13246ed845af7b0N.zip

  • Size

    1.8MB

  • Sample

    240712-26mc9sxbna

  • MD5

    0e9ea036cc3d12ebf13246ed845af7b0

  • SHA1

    1ca4f29e7730f4a58f5024b550e25777c185837e

  • SHA256

    0011c648908367121eaa246fdd1dc0b4464aecbb48ecfe303e90625fcf6690d3

  • SHA512

    e14354ce87e3b08e0daeb5efc9717e9e528484e304235c49805ac32a21c71611c489cbd4cffc4538de5a77bc3007874b35f62de142a50d465119b46b50101007

  • SSDEEP

    49152:QpBkZr4lMy4rb8k8oRlw71f650JAK8J1creWGw:QHIr4u1MFoRlw71f65KtO1crebw

Score
10/10

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

racksbit.duckdns.org:4013

Attributes
  • communication_password

    827ccb0eea8a706c4c34a16891f84e7b

  • tor_process

    tor

Targets

    • Target

      Receipt.exe

    • Size

      300.0MB

    • MD5

      9b5cedfdbe69f0ae2d9fd76a8ca7c395

    • SHA1

      bbf67b37e6a227a0719dafcfb8e28daeafedd189

    • SHA256

      7d1110907532d120ac7cf5e077b7b68298708630f079997b2f2758efaaf4d22b

    • SHA512

      9a02e1c81836bafe82e31d24259eba132929b99c5fb74025bc64820995eb6f3d25e548e6fd318b1be3b555b9e8b6a139a543037d07f6914749fe496c1dfac3d6

    • SSDEEP

      49152:hBkHVm1sE2BbkkwaFXw7Nt25SVEK6/1S2Uwc:/YVmC7GRaFXw7Nt25ep01S2Uwc

    Score
    10/10
    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks