Overview
overview
10Static
static
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...la.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.pdf
windows10-ltsc_2021-x64
3rihuata-ma...gh.exe
windows10-ltsc_2021-x64
10rihuata-ma...er.exe
windows10-ltsc_2021-x64
7rihuata-ma...er.exe
windows10-ltsc_2021-x64
8rihuata-ma...er.exe
windows10-ltsc_2021-x64
7rihuata-ma...ee.exe
windows10-ltsc_2021-x64
8rihuata-ma...pa.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
rihuata-ma...ii.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
7rihuata-ma...lu.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...rs.exe
windows10-ltsc_2021-x64
8rihuata-ma...wa.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...ix.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...wd.exe
windows10-ltsc_2021-x64
10rihuata-ma...ee.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...wa.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...ka.exe
windows10-ltsc_2021-x64
7rihuata-ma...da.exe
windows10-ltsc_2021-x64
10rihuata-ma...de.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
05/04/2025, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
rihuata-main/bomepratiaosa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
rihuata-main/bvrtiawdktgawdlla.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
rihuata-main/filesaa.pdf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
rihuata-main/gopawdkrjgh.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral5
Sample
rihuata-main/gramiltter.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
rihuata-main/huilter.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
rihuata-main/jaconfager.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
rihuata-main/kalrtotypadjeee.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
rihuata-main/kilapopa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
rihuata-main/klamingosa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
rihuata-main/kloalersaniii.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral12
Sample
rihuata-main/kukurumalasa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
rihuata-main/lotuserkasasa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
rihuata-main/lukarakalu.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
rihuata-main/mbnorad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral16
Sample
rihuata-main/mimamopetuesa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral17
Sample
rihuata-main/mumirolepawers.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral18
Sample
rihuata-main/nbitoadkrtjkajdwa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral19
Sample
rihuata-main/nborepadiktad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
rihuata-main/nenruioepad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral21
Sample
rihuata-main/nixmixhix.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral22
Sample
rihuata-main/nopekapeaaa.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral23
Sample
rihuata-main/nvpwadkkthaaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral24
Sample
rihuata-main/nvtipoawdkthawd.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
rihuata-main/oplaserkanureee.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral26
Sample
rihuata-main/oprlalalalklaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral27
Sample
rihuata-main/ripapakalswa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral28
Sample
rihuata-main/tiawdkthawdaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral29
Sample
rihuata-main/vjtkadkrihgka.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
rihuata-main/wkerkadlrgiajda.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral31
Sample
rihuata-main/zuyokhrfhhfde.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
rihuata-main/mbnorad.exe
-
Size
3.8MB
-
MD5
808005572c1c65a4a6166ed83f7180b4
-
SHA1
0c5818685f1a9bfe42dfad3323e964176d245e1c
-
SHA256
1f0279acdb1535a39a82d8a1baaf10e9dc307c043e38f53752e64408b50c58aa
-
SHA512
73cbcd79dfa5de8576afb4900a0a152329c76ac88e0cb2cc2e1c4ab4bae041b2eb04720490a7509e23fc267fcfa37d8dca6df68bb0ffbbf892bb1e7a887be80c
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/PmlwXVZ4FB:5+R/eZADUXR
Malware Config
Extracted
bitrat
1.38
31.177.110.225:8080
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Appdata
-
install_file
FileManager
-
tor_process
tor
Signatures
-
Bitrat family
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FileManager = "C:\\Users\\Admin\\AppData\\Local\\Appdata\\FileManager䜀" mbnorad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FileManager = "C:\\Users\\Admin\\AppData\\Local\\Appdata\\FileManager" mbnorad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FileManager = "C:\\Users\\Admin\\AppData\\Local\\Appdata\\FileManagerȀ" mbnorad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FileManager = "C:\\Users\\Admin\\AppData\\Local\\Appdata\\FileManager餀" mbnorad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FileManager = "C:\\Users\\Admin\\AppData\\Local\\Appdata\\FileManager瘀" mbnorad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FileManager = "C:\\Users\\Admin\\AppData\\Local\\Appdata\\FileManager怀" mbnorad.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbnorad.exe -
Suspicious behavior: RenamesItself 30 IoCs
pid Process 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe 5372 mbnorad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 5372 mbnorad.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5372 mbnorad.exe 5372 mbnorad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rihuata-main\mbnorad.exe"C:\Users\Admin\AppData\Local\Temp\rihuata-main\mbnorad.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:3332
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:2004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:3808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5620
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:1808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:224
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5476
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:3232
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:1680
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:1092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5396
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:2264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:2368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:4960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5532
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Appdata\FileManager1⤵PID:5956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23B
MD53aea26bbb1a80be6defef5e08b785138
SHA147bd5d2600766cb214972441b754fbf0e2e1a458
SHA2562321bd0dcab3570cb4b36871411be2b13d70ccbaca5db547ed054b87ee563684
SHA5121f9bd684b0ee7f3b5a427f4899b86aec322931ad835e2f05c8cebb52a8c03d59f6ad3c7e37fc340035fe3a5b0d891cb626f8f2a32568ff337d656a3a8636a7a9