MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9bfd468b402317eb1dc711af78f4340d855cbf234a4736188283a6fa6f8d3cb2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BitRAT


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 3 File information Comments

SHA256 hash: 9bfd468b402317eb1dc711af78f4340d855cbf234a4736188283a6fa6f8d3cb2
SHA3-384 hash: 1e3142d44852d2e35ecc857605f622321c1846294e194bda0d2eaf49e75273b59b6515951ee643225d2c4e73abbf94c2
SHA1 hash: c1e42ad6521b9c5a4f464f83b85a23024075e952
MD5 hash: 2b0eee70b8aa1f50f397502b29921f8e
humanhash: don-speaker-iowa-delaware
File name:Ozmxatmtnyjmmnespgaqcxwhfqpufmkzto.exe
Download: download sample
Signature BitRAT
File size:727'552 bytes
First seen:2021-11-23 09:07:21 UTC
Last seen:2021-11-23 11:06:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash eb3e9d8cf19100c077e1fdd127bcd369 (3 x Formbook, 1 x BitRAT)
ssdeep 12288:g6Hvy5le1KrvnEWkPpgiVymUqmCRb3seJ1B8oDfwUCm0gRS+:g6PWleMvnEW0pgiJUUx3zJ1Bp7cH
Threatray 538 similar samples on MalwareBazaar
TLSH T197F49D53F68E9576E2B91A7CCD07939DEB357E103E299C4A29F02E08DF39588713A113
File icon (PE):PE icon
dhash icon 342c6c9c97cc6493 (3 x Formbook, 1 x BitRAT)
Reporter abuse_ch
Tags:BitRAT exe RAT


Avatar
abuse_ch
BitRAT C2:
20.124.111.166:2223

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
20.124.111.166:2223 https://threatfox.abuse.ch/ioc/253430/

Intelligence


File Origin
# of uploads :
2
# of downloads :
184
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Ozmxatmtnyjmmnespgaqcxwhfqpufmkzto.exe
Verdict:
Malicious activity
Analysis date:
2021-11-23 09:31:06 UTC
Tags:
trojan bitrat rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Setting a global event handler
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a global event handler for the keyboard
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad.phis.spyw
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Hides threads from debuggers
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Sample uses process hollowing technique
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 527015 Sample: Ozmxatmtnyjmmnespgaqcxwhfqp... Startdate: 23/11/2021 Architecture: WINDOWS Score: 100 97 Antivirus detection for dropped file 2->97 99 Multi AV Scanner detection for submitted file 2->99 101 Yara detected BitRAT 2->101 103 PE file has nameless sections 2->103 9 Ozmxatmtnyjmmnespgaqcxwhfqpufmkzto.exe 1 24 2->9         started        14 Ozmxatmt.exe 13 2->14         started        16 Ozmxatmt.exe 14 2->16         started        process3 dnsIp4 93 cdn.discordapp.com 162.159.129.233, 443, 49758, 49759 CLOUDFLARENETUS United States 9->93 81 C:\Users\Public\Libraries\...\Ozmxatmt.exe, PE32 9->81 dropped 83 C:\Users\...\Ozmxatmt.exe:Zone.Identifier, ASCII 9->83 dropped 127 Writes to foreign memory regions 9->127 129 Creates a thread in another existing process (thread injection) 9->129 131 Injects a PE file into a foreign processes 9->131 18 logagent.exe 1 5 9->18         started        23 cmd.exe 1 9->23         started        25 cmd.exe 1 9->25         started        133 Multi AV Scanner detection for dropped file 14->133 27 logagent.exe 14->27         started        95 162.159.133.233, 443, 49781 CLOUDFLARENETUS United States 16->95 29 mobsync.exe 16->29         started        file5 signatures6 process7 dnsIp8 91 oka.nerdpol.ovh 20.124.111.166, 2223, 49773, 49782 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->91 77 C:\Users\user\AppData\Local\...\nXG1sNba.exe, MS-DOS 18->77 dropped 79 C:\Users\user\AppData\Local\...79PH8XFdP.exe, MS-DOS 18->79 dropped 113 Writes to foreign memory regions 18->113 115 Allocates memory in foreign processes 18->115 117 Sample uses process hollowing technique 18->117 119 Injects a PE file into a foreign processes 18->119 31 nXG1sNba.exe 18->31         started        34 NPH8XFdP.exe 18->34         started        37 logagent.exe 18->37         started        39 logagent.exe 18->39         started        121 Uses cmd line tools excessively to alter registry or file data 23->121 123 Uses schtasks.exe or at.exe to add and modify task schedules 23->123 41 cmd.exe 1 23->41         started        43 conhost.exe 23->43         started        45 reg.exe 1 25->45         started        47 conhost.exe 25->47         started        125 Hides threads from debuggers 27->125 file9 signatures10 process11 file12 135 Detected unpacking (changes PE section rights) 31->135 137 Injects a PE file into a foreign processes 31->137 49 nXG1sNba.exe 31->49         started        69 C:\Users\user\AppData\Local\...\Unknown.dll, PE32 34->69 dropped 71 C:\Users\user\AppData\...\vcruntime140.dll, PE32 34->71 dropped 73 C:\Users\user\AppData\Local\...\softokn3.dll, PE32 34->73 dropped 75 17 other files (none is malicious) 34->75 dropped 53 NPH8XFdP.exe 34->53         started        139 Uses cmd line tools excessively to alter registry or file data 41->139 55 conhost.exe 41->55         started        57 reg.exe 1 1 41->57         started        59 schtasks.exe 1 41->59         started        61 reg.exe 1 41->61         started        63 conhost.exe 45->63         started        signatures13 process14 dnsIp15 85 www.xenarmor.com 49->85 105 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 49->105 107 Tries to steal Instant Messenger accounts or passwords 49->107 109 Tries to steal Mail credentials (via file / registry access) 49->109 111 2 other signatures 49->111 65 conhost.exe 49->65         started        87 xenarmor.com 69.64.94.128 CODERO-DFWUS United States 53->87 89 www.xenarmor.com 53->89 67 conhost.exe 53->67         started        signatures16 process17
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2021-11-23 09:08:13 UTC
File Type:
PE (Exe)
Extracted files:
41
AV detection:
25 of 45 (55.56%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:bitrat persistence trojan upx
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
UPX packed file
BitRAT
BitRAT Payload
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EnvVarScheduledTasks
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC (ab)using Environment Variables in Scheduled Tasks
Rule name:MALWARE_Win_BitRAT
Author:ditekSHen
Description:Detects BitRAT RAT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments