General
-
Target
2025-04-02_233db400b1641dcc83fa3cfe57c6ec08_bitrat_black-basta_coinminer_luca-stealer
-
Size
7.8MB
-
Sample
250402-q2lemazn13
-
MD5
233db400b1641dcc83fa3cfe57c6ec08
-
SHA1
2f55301379d1c7a6c6d076f2a92c74c117bd8af2
-
SHA256
f527e2147a8d0e8edf5192559d24791766fd09618bf66cc27f214e34aeeaca32
-
SHA512
108225db45c3bf75a93f131a510fb32df595ac4da4df7b77151547e90848a8d88dd9e2511ff6cd046e5310df5c566b819cba03d8fea1c16fdd3b7247108dd62e
-
SSDEEP
196608:1IRcbH4jSteTGv9xwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:1dHsfu9xwZ6v1CPwDv3uFteg2EeJUO9E
Behavioral task
behavioral1
Sample
2025-04-02_233db400b1641dcc83fa3cfe57c6ec08_bitrat_black-basta_coinminer_luca-stealer.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
bitrat
1.38
53tboqg6srgh4xsaz6shnnshsqqccdzew5zwqzalfs2tuqw2cbf3i6yd.onion:80
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
-
install_file
.exe
-
tor_process
tor
Targets
-
-
Target
2025-04-02_233db400b1641dcc83fa3cfe57c6ec08_bitrat_black-basta_coinminer_luca-stealer
-
Size
7.8MB
-
MD5
233db400b1641dcc83fa3cfe57c6ec08
-
SHA1
2f55301379d1c7a6c6d076f2a92c74c117bd8af2
-
SHA256
f527e2147a8d0e8edf5192559d24791766fd09618bf66cc27f214e34aeeaca32
-
SHA512
108225db45c3bf75a93f131a510fb32df595ac4da4df7b77151547e90848a8d88dd9e2511ff6cd046e5310df5c566b819cba03d8fea1c16fdd3b7247108dd62e
-
SSDEEP
196608:1IRcbH4jSteTGv9xwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:1dHsfu9xwZ6v1CPwDv3uFteg2EeJUO9E
Score10/10-
Bitrat family
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-