General

  • Target

    2025-03-27_d00027e602f2de9ec97d21c30f3cc8ca_bitrat_black-basta_coinminer_luca-stealer

  • Size

    9.2MB

  • Sample

    250327-xrhdjsymz9

  • MD5

    d00027e602f2de9ec97d21c30f3cc8ca

  • SHA1

    5dd590a717b4ba755da315cb1daad08915195436

  • SHA256

    55abb5f587ab4e89fd3c44e94682a6eabfaf81329048588d17266d4527846478

  • SHA512

    29f6a935131a1a7790a5dccfde27ab697d4fe068e97ed7c63cbd11f0f3326569b09f951bbc2d9747bd6d36184c4684b0894a138110ccf0e1af53c6514130bff1

  • SSDEEP

    196608:gHyHu9V2Lh2xwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQp4xtw3iFFrS6XofTV73G:gSO922xwZ6v1CPwDv3uFteg2EeJUO9Wp

Malware Config

Extracted

Family

bitrat

Version

1.33

C2

jfxmgnxcvwtqwbxz2zb536al6p45fxtparbbppbflzrpaqxajzav6hqd.onion:80

Attributes
  • communication_password

    5ffc3746012bb1139c6bf49107694c1a

  • install_dir

    NvContainers

  • install_file

    nvgwlss.exe

  • tor_process

    NVDisplayContai

Targets

    • Target

      2025-03-27_d00027e602f2de9ec97d21c30f3cc8ca_bitrat_black-basta_coinminer_luca-stealer

    • Size

      9.2MB

    • MD5

      d00027e602f2de9ec97d21c30f3cc8ca

    • SHA1

      5dd590a717b4ba755da315cb1daad08915195436

    • SHA256

      55abb5f587ab4e89fd3c44e94682a6eabfaf81329048588d17266d4527846478

    • SHA512

      29f6a935131a1a7790a5dccfde27ab697d4fe068e97ed7c63cbd11f0f3326569b09f951bbc2d9747bd6d36184c4684b0894a138110ccf0e1af53c6514130bff1

    • SSDEEP

      196608:gHyHu9V2Lh2xwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQp4xtw3iFFrS6XofTV73G:gSO922xwZ6v1CPwDv3uFteg2EeJUO9Wp

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Bitrat family

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks