MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69030d7bb20e05dc3730aaf09d6815c2b5d46fe8ada819cc4c90e1e37fb173a6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BitRAT


Vendor detections: 12


Intelligence 12 IOCs 1 YARA File information Comments

SHA256 hash: 69030d7bb20e05dc3730aaf09d6815c2b5d46fe8ada819cc4c90e1e37fb173a6
SHA3-384 hash: 687f2676cabbe403a8fc52e506eaa09ad950b9726352c8b1970c8ca2420bc493bba51fb11fd0aa3ae5a5c1a474097743
SHA1 hash: e4eea38f4ae9faecf1d688df223cce5ebe311ed4
MD5 hash: bb5ff85163e1e630b371105224a1895c
humanhash: lima-magazine-early-sierra
File name:Delivery Report.exe
Download: download sample
Signature BitRAT
File size:1'152'512 bytes
First seen:2022-09-21 13:46:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4e9cec940cdf4d2eb78e1e202d25e125 (1 x BitRAT, 1 x Formbook, 1 x ModiLoader)
ssdeep 24576:0G5Tn5V1Tx/GsJ2ltEo6w7tNTa9W8AoqiVNW:0GJn3qltEzM
TLSH T11A359D53A3808633C62D16347DDF5216BF69FEC129242E5527E0FDBC9F3AE5066E1282
TrID 65.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
25.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.2% (.EXE) InstallShield setup (43053/19/16)
1.3% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.2% (.SCR) Windows screen saver (13101/52/3)
File icon (PE):PE icon
dhash icon 33f098d2d6d8f033 (12 x RemcosRAT, 7 x DBatLoader, 6 x Formbook)
Reporter abuse_ch
Tags:BitRAT exe RAT


Avatar
abuse_ch
BitRAT C2:
66.94.108.214:6655

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
66.94.108.214:6655 https://threatfox.abuse.ch/ioc/850901/

Intelligence


File Origin
# of uploads :
1
# of downloads :
332
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Delivery Report.exe
Verdict:
Malicious activity
Analysis date:
2022-09-21 13:47:29 UTC
Tags:
installer trojan bitrat rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Searching for the window
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Setting a global event handler
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a global event handler for the keyboard
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitRAT, DBatLoader
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Hides threads from debuggers
Injects a PE file into a foreign processes
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Suspicious powershell command line found
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected BitRAT
Yara detected DBatLoader
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 707185 Sample: Delivery Report.exe Startdate: 21/09/2022 Architecture: WINDOWS Score: 100 83 Multi AV Scanner detection for domain / URL 2->83 85 Multi AV Scanner detection for dropped file 2->85 87 Yara detected UAC Bypass using ComputerDefaults 2->87 89 3 other signatures 2->89 10 Delivery Report.exe 1 22 2->10         started        15 Yktqyrse.exe 13 2->15         started        17 Yktqyrse.exe 14 2->17         started        process3 dnsIp4 65 l-0003.l-dc-msedge.net 13.107.43.12, 443, 49697, 49699 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 10->65 67 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49696, 49698 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 10->67 73 3 other IPs or domains 10->73 55 C:\Users\Public\Libraries\Yktqyrse.exe, PE32 10->55 dropped 57 C:\Users\...\Yktqyrse.exe:Zone.Identifier, ASCII 10->57 dropped 59 C:\Users\Public\Libraries\Yktqyrse, data 10->59 dropped 61 2 other files (none is malicious) 10->61 dropped 103 Injects a PE file into a foreign processes 10->103 19 cmd.exe 3 10->19         started        22 Delivery Report.exe 10->22         started        69 tjykgw.bn.files.1drv.com 15->69 75 2 other IPs or domains 15->75 25 Yktqyrse.exe 15->25         started        71 tjykgw.bn.files.1drv.com 17->71 77 2 other IPs or domains 17->77 27 Yktqyrse.exe 17->27         started        file5 signatures6 process7 dnsIp8 91 Uses ping.exe to sleep 19->91 93 Drops executables to the windows directory (C:\Windows) and starts them 19->93 95 Uses ping.exe to check the status of other devices and networks 19->95 29 easinvoker.exe 19->29         started        31 PING.EXE 1 19->31         started        34 xcopy.exe 2 19->34         started        39 6 other processes 19->39 63 febbit2.ddns.net 66.94.108.214, 49711, 49713, 49714 AWESOMENET-CORPUS United States 22->63 97 Hides threads from debuggers 22->97 37 WerFault.exe 22->37         started        signatures9 process10 dnsIp11 41 cmd.exe 1 29->41         started        79 127.0.0.1 unknown unknown 31->79 81 192.168.2.1 unknown unknown 31->81 51 C:\Windows \System32\easinvoker.exe, PE32+ 34->51 dropped 53 C:\Windows \System32\netutils.dll, PE32+ 39->53 dropped file12 process13 signatures14 99 Suspicious powershell command line found 41->99 101 Adds a directory exclusion to Windows Defender 41->101 44 powershell.exe 21 41->44         started        47 conhost.exe 41->47         started        process15 signatures16 105 DLL side loading technique detected 44->105 49 conhost.exe 44->49         started        process17
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-09-21 13:47:11 UTC
File Type:
PE (Exe)
Extracted files:
50
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:bitrat family:modiloader persistence trojan upx
Behaviour
Enumerates system info in registry
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
UPX packed file
ModiLoader Second Stage
BitRAT
ModiLoader, DBatLoader
Malware Config
C2 Extraction:
febbit2.ddns.net:6655
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
69030d7bb20e05dc3730aaf09d6815c2b5d46fe8ada819cc4c90e1e37fb173a6
MD5 hash:
bb5ff85163e1e630b371105224a1895c
SHA1 hash:
e4eea38f4ae9faecf1d688df223cce5ebe311ed4
Detections:
DbatLoaderStage1
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments