General

  • Target

    stub.exe

  • Size

    3.8MB

  • Sample

    240825-vlz1aswfrk

  • MD5

    b68f66b5f2a41de572a784d603eaa230

  • SHA1

    7ba4f34b08e472351d0f73f01cfca3d54de48689

  • SHA256

    1eb852ea8cdd3be460ae959a012a1e2122435d7e9b6196c5eacd2bf7f92b0f83

  • SHA512

    d6195c4ef4ffa11b5f5f5c539fd1df95b79bef6702035f82355d165459351dd6bb25b57cbe8075cca71b7f5db37c1362371420e7e94b229ac72ed2cf72b46409

  • SSDEEP

    98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/rmlwXVZ4FB:5+R/eZADUXR

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

IP:Port

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • install_dir

    Install path

  • install_file

    Install name

  • tor_process

    tor

Targets

    • Target

      stub.exe

    • Size

      3.8MB

    • MD5

      b68f66b5f2a41de572a784d603eaa230

    • SHA1

      7ba4f34b08e472351d0f73f01cfca3d54de48689

    • SHA256

      1eb852ea8cdd3be460ae959a012a1e2122435d7e9b6196c5eacd2bf7f92b0f83

    • SHA512

      d6195c4ef4ffa11b5f5f5c539fd1df95b79bef6702035f82355d165459351dd6bb25b57cbe8075cca71b7f5db37c1362371420e7e94b229ac72ed2cf72b46409

    • SSDEEP

      98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/rmlwXVZ4FB:5+R/eZADUXR

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks