MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e64680fcc09a464e9c482987f8727df5d25ec4bbc312db6a51d557178f9ab17a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
BitRAT
Vendor detections: 9
| SHA256 hash: | e64680fcc09a464e9c482987f8727df5d25ec4bbc312db6a51d557178f9ab17a |
|---|---|
| SHA3-384 hash: | 77cba158ea87375142daf20e86925f99d6ce731bd16f70b2b332da2dfa6aef45862e76c1c19556e6bf3816750ab7d191 |
| SHA1 hash: | d140c9f54972d020ad513a9a6e88ebe6589e2cc2 |
| MD5 hash: | 5097ab66c01668d070e5e522a971a561 |
| humanhash: | missouri-leopard-moon-bravo |
| File name: | 5097AB66C01668D070E5E522A971A561.exe |
| Download: | download sample |
| Signature | BitRAT |
| File size: | 2'762'482 bytes |
| First seen: | 2021-07-05 21:30:58 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3abe302b6d9a1256e6a915429af4ffd2 (277 x GuLoader, 38 x Formbook, 25 x Loki) |
| ssdeep | 49152:okNmYG3rYl6RRDDOg3puSiiCn6acMCCLJDsB1QJ0Mcjmjm67kW+:ok/6RFi9n6sNsBGFvm67h+ |
| Threatray | 255 similar samples on MalwareBazaar |
| TLSH | 0AD533748565891BC729927D5AE8F97CBE4C9CC4F1D076864BF93ECB393BA20140E34A |
| Reporter | |
| Tags: | BitRAT exe RAT |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 185.29.11.26:443 | https://threatfox.abuse.ch/ioc/157639/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5097AB66C01668D070E5E522A971A561.exe
Verdict:
Malicious activity
Analysis date:
2021-07-05 21:32:52 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
BitRAT
Detection(s):
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
BitRAT
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected BitRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Solmyr
Status:
Malicious
First seen:
2021-07-03 07:41:38 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 245 additional samples on MalwareBazaar
Result
Malware family:
bitrat
Score:
10/10
Tags:
family:bitrat trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Loads dropped DLL
BitRAT
BitRAT Payload
Unpacked files
SH256 hash:
aee88b812edfe23dcae03c9019661509250ed150fc6d8645085b1aa99f46b172
MD5 hash:
cdeb427bb033e7b94046f3cf76b37b7f
SHA1 hash:
11526eaaaa47a38740eb3a2a26a9e793f78524e0
SH256 hash:
c5f401569bca10252913cb7f35cc02244a0c49fa3a48e0de2ea0dac8e1f518a7
MD5 hash:
bd5a994a03d58aa79bc565e003cf4a85
SHA1 hash:
d1295c5782c4984ea26487ddc5a2276f28b90d4e
SH256 hash:
e64680fcc09a464e9c482987f8727df5d25ec4bbc312db6a51d557178f9ab17a
MD5 hash:
5097ab66c01668d070e5e522a971a561
SHA1 hash:
d140c9f54972d020ad513a9a6e88ebe6589e2cc2
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.57
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.