MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c433cb1c5fbe7966fc5545c22a795866484b7bab4600598629939ed4a542b01. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BitRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 3c433cb1c5fbe7966fc5545c22a795866484b7bab4600598629939ed4a542b01
SHA3-384 hash: b176796bc7d3877cccdde0d593d81ba8bd57c2f215f1ed69a51e709e5eb58325b8e8ef9257e7ed7c2b5a7f8c601b46dc
SHA1 hash: cbb7af7ecc36efcabcb470643bca94989c4dd4b8
MD5 hash: 5368930e073889874745e520be58b06d
humanhash: rugby-don-one-bulldog
File name:SecuriteInfo.com.Trojan.Win32.Save.a.24731.24808
Download: download sample
Signature BitRAT
File size:2'226'176 bytes
First seen:2021-03-29 10:43:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 49152:2W/ExXa6l03M2hVE/5JF+gpUqQfSkrrvzlPo79L4NoJ5ROq5W:dEg6G3M8K/F+gIakvelQCOy
Threatray 128 similar samples on MalwareBazaar
TLSH ECA5230C9A8FD92BD316CBF68177E0B9077EB9C4FDD702B5750AA84EE9ED16D0100A25
Reporter SecuriteInfoCom
Tags:BitRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.Win32.Save.a.24731.24808
Verdict:
Malicious activity
Analysis date:
2021-03-29 10:45:50 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a window
Setting a global event handler
Connection attempt
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Setting a global event handler for the keyboard
Enabling autorun
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitRAT Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to hide a thread from the debugger
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected BitRAT
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Downloader.Seraph
Status:
Malicious
First seen:
2021-03-29 08:37:04 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:bitrat persistence trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
BitRAT
BitRAT Payload
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
ad8ce7797b66755b59bee77558a9165929c7cfbd6f45b03fdaf269a4f1288462
MD5 hash:
a416747e91d17f8217cfff8a47e7e5b8
SHA1 hash:
3ecb0b3a7886fb13a3425a2e525bc1fcde3f14d6
SH256 hash:
fcb18a0a8b57fcc6a4b22aec3b3a4f156daabb3c80409a2068aad679072e5428
MD5 hash:
f3b59c0292db2b3ec9ce7e414dd8f0e0
SHA1 hash:
f4bc8f1123f7f4b1f061b5a2779b28f7687ef456
SH256 hash:
3c433cb1c5fbe7966fc5545c22a795866484b7bab4600598629939ed4a542b01
MD5 hash:
5368930e073889874745e520be58b06d
SHA1 hash:
cbb7af7ecc36efcabcb470643bca94989c4dd4b8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:MALWARE_Win_BitRAT
Author:ditekSHen
Description:Detects BitRAT RAT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BitRAT

Executable exe 3c433cb1c5fbe7966fc5545c22a795866484b7bab4600598629939ed4a542b01

(this sample)

  
Delivery method
Distributed via web download

Comments