General

  • Target

    JaffaCakes118_e8b088e5944106e2ea4faf15fe283be5

  • Size

    3.7MB

  • Sample

    250110-tty8asyrcx

  • MD5

    e8b088e5944106e2ea4faf15fe283be5

  • SHA1

    f2a69aca792d12cb5181b7e79011d160631c96c9

  • SHA256

    4006ccc6035e25005fcd9568eaa3e4aa4559cea66afe969ef74143d0b8caac60

  • SHA512

    b626548865f7c98ef44191ce4555c263ab45c5d4a84fc80779bb3795cb1ccc6dbf2ae987a1dbccfd62a603d2016685b13176d4f99cc91a179009232dd1c8765a

  • SSDEEP

    24576:IryW3GF/TM9IG9L9ZlR7FJfSvrl+sUic7Za0aFg4bkcOFIk86q5hpmqP147IR/vM:C

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

racks006.duckdns.org:33957

Attributes
  • communication_password

    d6723e7cd6735df68d1ce4c704c29a04

  • tor_process

    tor

Targets

    • Target

      JaffaCakes118_e8b088e5944106e2ea4faf15fe283be5

    • Size

      3.7MB

    • MD5

      e8b088e5944106e2ea4faf15fe283be5

    • SHA1

      f2a69aca792d12cb5181b7e79011d160631c96c9

    • SHA256

      4006ccc6035e25005fcd9568eaa3e4aa4559cea66afe969ef74143d0b8caac60

    • SHA512

      b626548865f7c98ef44191ce4555c263ab45c5d4a84fc80779bb3795cb1ccc6dbf2ae987a1dbccfd62a603d2016685b13176d4f99cc91a179009232dd1c8765a

    • SSDEEP

      24576:IryW3GF/TM9IG9L9ZlR7FJfSvrl+sUic7Za0aFg4bkcOFIk86q5hpmqP147IR/vM:C

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Bitrat family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks