General

  • Target

    0a99a8953769de42b0a9673ed1e8003793b5228a225f4b8a5d7a3f2c80fb1146N

  • Size

    7.8MB

  • Sample

    240920-lx49qa1bpp

  • MD5

    5d7a6871f5d94d0283ffd09ce9a10e50

  • SHA1

    d9b4e1aa67f2cfb503d879452fa0852ba7284590

  • SHA256

    0a99a8953769de42b0a9673ed1e8003793b5228a225f4b8a5d7a3f2c80fb1146

  • SHA512

    db0e33d9c363c5fec6c538d1e1f4e985026d72eb0326d85a06f8f3b2e8a0b801c63f1e9d06133f0c3c2d5b0cacac7bef2180d58b31decd7e2a9ec7bbc650908f

  • SSDEEP

    196608:CWx+Kdiqx6F9lxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOfTV4:CWxVdiX/xwZ6v1CPwDv3uFteg2EeJUOf

Malware Config

Extracted

Family

bitrat

Version

1.35

C2

hijy62t5b43fhu3dblgep4drtoqjpfi7jgxqaectce2verypcui3qbad.onion:80

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • install_dir

    mucro

  • install_file

    micro.exe

  • tor_process

    mschostw

Targets

    • Target

      0a99a8953769de42b0a9673ed1e8003793b5228a225f4b8a5d7a3f2c80fb1146N

    • Size

      7.8MB

    • MD5

      5d7a6871f5d94d0283ffd09ce9a10e50

    • SHA1

      d9b4e1aa67f2cfb503d879452fa0852ba7284590

    • SHA256

      0a99a8953769de42b0a9673ed1e8003793b5228a225f4b8a5d7a3f2c80fb1146

    • SHA512

      db0e33d9c363c5fec6c538d1e1f4e985026d72eb0326d85a06f8f3b2e8a0b801c63f1e9d06133f0c3c2d5b0cacac7bef2180d58b31decd7e2a9ec7bbc650908f

    • SSDEEP

      196608:CWx+Kdiqx6F9lxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOfTV4:CWxVdiX/xwZ6v1CPwDv3uFteg2EeJUOf

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks