General

  • Target

    f527e2147a8d0e8edf5192559d24791766fd09618bf66cc27f214e34aeeaca32

  • Size

    7.8MB

  • Sample

    250402-f2hnma11cw

  • MD5

    233db400b1641dcc83fa3cfe57c6ec08

  • SHA1

    2f55301379d1c7a6c6d076f2a92c74c117bd8af2

  • SHA256

    f527e2147a8d0e8edf5192559d24791766fd09618bf66cc27f214e34aeeaca32

  • SHA512

    108225db45c3bf75a93f131a510fb32df595ac4da4df7b77151547e90848a8d88dd9e2511ff6cd046e5310df5c566b819cba03d8fea1c16fdd3b7247108dd62e

  • SSDEEP

    196608:1IRcbH4jSteTGv9xwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:1dHsfu9xwZ6v1CPwDv3uFteg2EeJUO9E

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

53tboqg6srgh4xsaz6shnnshsqqccdzew5zwqzalfs2tuqw2cbf3i6yd.onion:80

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • install_dir

     

  • install_file

     .exe

  • tor_process

    tor

Targets

    • Target

      f527e2147a8d0e8edf5192559d24791766fd09618bf66cc27f214e34aeeaca32

    • Size

      7.8MB

    • MD5

      233db400b1641dcc83fa3cfe57c6ec08

    • SHA1

      2f55301379d1c7a6c6d076f2a92c74c117bd8af2

    • SHA256

      f527e2147a8d0e8edf5192559d24791766fd09618bf66cc27f214e34aeeaca32

    • SHA512

      108225db45c3bf75a93f131a510fb32df595ac4da4df7b77151547e90848a8d88dd9e2511ff6cd046e5310df5c566b819cba03d8fea1c16fdd3b7247108dd62e

    • SSDEEP

      196608:1IRcbH4jSteTGv9xwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:1dHsfu9xwZ6v1CPwDv3uFteg2EeJUO9E

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Bitrat family

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks