MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 086292a6bfd70867d0186a92add0deca164c0588fc37c30c4401e249c2b59257. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BitRAT


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 3 File information Comments

SHA256 hash: 086292a6bfd70867d0186a92add0deca164c0588fc37c30c4401e249c2b59257
SHA3-384 hash: c5bc15af2827ffb673c6e5cb8b1a2d7b4191efcb4c64758e0ede3021feb3b1179e0c5054e0a28c939fd2aeb77ae46ae2
SHA1 hash: b649bf868ba6b6af9e188a12d31dbf9d441e686d
MD5 hash: 6058fc9b3955abbdb041786a3d9e39fd
humanhash: happy-happy-stairway-helium
File name:6058FC9B3955ABBDB041786A3D9E39FD.exe
Download: download sample
Signature BitRAT
File size:4'043'480 bytes
First seen:2021-03-30 19:39:17 UTC
Last seen:2021-03-30 20:38:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 98304:Zx36ypySjmBut47ueu4DzgblXG3M8K/F+gIakvelQCJn:L6NSKBuIue/E23K/F+5GQCl
Threatray 135 similar samples on MalwareBazaar
TLSH D51633887FD86828E3D1797A4FB6E5F81730BD1C5A688662B0F56F8B7BFC2471054602
Reporter abuse_ch
Tags:BitRAT exe RAT


Avatar
abuse_ch
BitRAT C2:
179.43.157.158:7777

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
179.43.157.158:7777 https://threatfox.abuse.ch/ioc/6162/

Intelligence


File Origin
# of uploads :
2
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6058FC9B3955ABBDB041786A3D9E39FD.exe
Verdict:
Malicious activity
Analysis date:
2021-03-30 19:43:48 UTC
Tags:
trojan bitrat rat stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
DNS request
Setting a global event handler
Sending a custom TCP request
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
Sending an HTTP GET request
Deleting a recently created file
Replacing files
Reading critical registry keys
Enabling the 'hidden' option for recently created files
Setting a global event handler for the keyboard
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
AveMaria BitRAT Xmrig
Detection:
malicious
Classification:
phis.troj.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus detection for dropped file
Contains functionality to steal e-mail passwords
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AveMaria stealer
Yara detected BitRAT
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 378431 Sample: Khay11iwV6.exe Startdate: 30/03/2021 Architecture: WINDOWS Score: 100 71 www.xenarmor.com 2->71 73 xenarmor.com 2->73 75 2 other IPs or domains 2->75 97 Antivirus detection for dropped file 2->97 99 Multi AV Scanner detection for submitted file 2->99 101 Yara detected BitRAT 2->101 103 4 other signatures 2->103 11 Khay11iwV6.exe 3 9 2->11         started        signatures3 process4 file5 57 C:\Users\user\AppData\Local\Temp\ssl.exe, PE32 11->57 dropped 59 C:\Users\user\AppData\...\AddInProcess32.exe, PE32 11->59 dropped 61 C:\Users\user\AppData\...\Khay11iwV6.exe.log, ASCII 11->61 dropped 63 C:\Users\user\AppData\Roaming\...\Chrome.exe, PE32 11->63 dropped 115 Creates an undocumented autostart registry key 11->115 117 Writes to foreign memory regions 11->117 119 Injects a PE file into a foreign processes 11->119 15 wscript.exe 1 11->15         started        17 AddInProcess32.exe 17 11->17         started        signatures6 process7 dnsIp8 21 ssl.exe 1 19 15->21         started        65 envy.ddnsgeek.com 179.43.157.158, 49743, 49746, 49748 PLI-ASCH Panama 17->65 67 api.telegram.org 17->67 69 VXHosting.ddnsgeek.com 17->69 95 Hides threads from debuggers 17->95 signatures9 process10 dnsIp11 81 api.telegram.org 149.154.167.220, 443, 49747 TELEGRAMRU United Kingdom 21->81 83 VXHosting.ddnsgeek.com 179.43.140.204, 49723, 49724, 49727 PLI-ASCH Panama 21->83 85 2 other IPs or domains 21->85 105 Detected unpacking (changes PE section rights) 21->105 107 Tries to steal Mail credentials (via file registry) 21->107 109 Machine Learning detection for dropped file 21->109 111 3 other signatures 21->111 25 ssl.exe 21->25         started        29 ssl.exe 21->29         started        31 ssl.exe 21->31         started        signatures12 process13 file14 47 C:\Users\user\AppData\...\vcruntime140.dll, PE32 25->47 dropped 49 C:\Users\user\AppData\Local\...\softokn3.dll, PE32 25->49 dropped 51 C:\Users\user\AppData\Local\Temp\...\nss3.dll, PE32 25->51 dropped 55 16 other files (none is malicious) 25->55 dropped 113 Injects a PE file into a foreign processes 25->113 33 ssl.exe 25->33         started        53 C:\Users\user\AppData\Local\...\Unknown.dll, PE32 29->53 dropped 36 ssl.exe 29->36         started        39 ssl.exe 31->39         started        signatures15 process16 dnsIp17 87 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 33->87 89 Tries to steal Instant Messenger accounts or passwords 33->89 91 Tries to steal Mail credentials (via file access) 33->91 93 2 other signatures 33->93 41 conhost.exe 33->41         started        77 www.xenarmor.com 36->77 79 xenarmor.com 69.64.94.128 CODERO-DFWUS United States 36->79 43 conhost.exe 36->43         started        45 conhost.exe 39->45         started        signatures18 process19
Threat name:
ByteCode-MSIL.Spyware.Solmyr
Status:
Malicious
First seen:
2021-03-28 03:48:44 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
  2/5
Result
Malware family:
xenarmor
Score:
  10/10
Tags:
family:bitrat family:xenarmor password recovery spyware stealer trojan upx
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Loads dropped DLL
Reads data files stored by FTP clients
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
UPX packed file
ACProtect 1.3x - 1.4x DLL software
BitRAT
BitRAT Payload
XenArmor Suite
Unpacked files
SH256 hash:
400bbb66903646d89cd6c9590704dc743bf5a0994246d5d4158cfd210c85e870
MD5 hash:
eb765ed7efdc31f2acf0ed600a52f910
SHA1 hash:
557bacf3ed726cec12f9bc43dde45fae882ad8a9
SH256 hash:
dc5d409704140231e3b09c90a19edcd95ef32cd2431979bdd78d95f10bb136ed
MD5 hash:
1356fe578d0058bfc6fc171a854d7d79
SHA1 hash:
1df11d5fdc7c86f25ef5759be86e541e063ba50e
SH256 hash:
72a7168ec3d13a5ef01221283d1c72b97c55b16ead639191b3b558df764d2516
MD5 hash:
ae87a91d9fa95bca2c87a0f7fa3bf9f9
SHA1 hash:
101b7e55ea743c9632ed812d95a0afa98f051245
SH256 hash:
086292a6bfd70867d0186a92add0deca164c0588fc37c30c4401e249c2b59257
MD5 hash:
6058fc9b3955abbdb041786a3d9e39fd
SHA1 hash:
b649bf868ba6b6af9e188a12d31dbf9d441e686d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_BitRAT
Author:ditekSHen
Description:Detects BitRAT RAT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments