MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 719548921d3a99d8bf31d9c2d543803c0c39a620a8386f8ac557b7ebe5d024d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BitRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 5 File information Comments

SHA256 hash: 719548921d3a99d8bf31d9c2d543803c0c39a620a8386f8ac557b7ebe5d024d2
SHA3-384 hash: b41b5e3f99a71d8a7f4bf649a2be2799b5b7539eb6dea5212e3c15d2628d3e36796e46b2fe78d56dbc6f0f80448fb103
SHA1 hash: 896386e7fd8d86ab3819598f4a549e61b919eee4
MD5 hash: 63e1c29b4c151caf92970fbaf8e0c2a7
humanhash: hamper-salami-single-august
File name:FAVOR DE RECTIFICAR.scr.exe
Download: download sample
Signature BitRAT
File size:2'183'168 bytes
First seen:2023-05-31 17:10:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bb2690f72e68072712a6c527c992f5ef (1 x BitRAT)
ssdeep 49152:GCO1NlTK6quyJYbwyi0UZTdA71QxlJOJ56eJwzG6hCF98v7:GJATVdA7WtOOeiv7
Threatray 596 similar samples on MalwareBazaar
TLSH T104A5CF26B1A5F561D80641B05D22C5F93529FC3AA0326D07BAF17F8B94703C3ADB937A
TrID 74.4% (.EXE) Win32 Executable Microsoft Visual Basic 6 (82067/2/8)
9.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.0% (.EXE) Win32 Executable (generic) (4505/5/1)
1.8% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 1870e2d0ecf06061 (1 x BitRAT)
Reporter abuse_ch
Tags:BitRAT exe RAT


Avatar
abuse_ch
BitRAT C2:
45.81.39.62:7011

Intelligence


File Origin
# of uploads :
1
# of downloads :
389
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
FAVOR DE RECTIFICAR.scr.exe
Verdict:
Malicious activity
Analysis date:
2023-05-31 17:12:38 UTC
Tags:
bitrat rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Creating a process from a recently created file
Creating a process with a hidden window
DNS request
Setting a global event handler
Sending a custom TCP request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Setting a global event handler for the keyboard
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
cmd.exe evasive lolbin packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates executable files without a name
Drops PE files to the startup folder
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected BitRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Babar
Status:
Malicious
First seen:
2023-05-31 17:11:06 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
10 of 37 (27.03%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:bitrat trojan upx
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Drops startup file
Executes dropped EXE
Loads dropped DLL
UPX packed file
BitRAT
Malware Config
C2 Extraction:
bitratluckshinjisix130.freeddns.org:7011
Unpacked files
SH256 hash:
b9cac04ff1698eb55c5b898a70ed8dc7d79844f9453aa0bd479b678dbd4f6a83
MD5 hash:
4d4507b9ad005bbed5af3acd15e999da
SHA1 hash:
f547198f4ee08c31d80274e538907c9a07ca7ffd
Detections:
BitRat win_bit_rat_auto
SH256 hash:
719548921d3a99d8bf31d9c2d543803c0c39a620a8386f8ac557b7ebe5d024d2
MD5 hash:
63e1c29b4c151caf92970fbaf8e0c2a7
SHA1 hash:
896386e7fd8d86ab3819598f4a549e61b919eee4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:bitrat_unpacked
Author:jeFF0Falltrades
Description:Experimental rule to detect unpacked BitRat payloads on disk or in memory, looking for a combination of strings and decryption/decoding patterns
Reference:https://krabsonsecurity.com/2020/08/22/bitrat-the-latest-in-copy-pasted-malware-by-incompetent-developers/
Rule name:MALWARE_Win_BitRAT
Author:ditekSHen
Description:Detects BitRAT RAT
Rule name:Windows_Trojan_Bitrat_54916275
Author:Elastic Security
Rule name:win_bit_rat_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.bit_rat.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments