MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e64680fcc09a464e9c482987f8727df5d25ec4bbc312db6a51d557178f9ab17a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BitRAT


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: e64680fcc09a464e9c482987f8727df5d25ec4bbc312db6a51d557178f9ab17a
SHA3-384 hash: 77cba158ea87375142daf20e86925f99d6ce731bd16f70b2b332da2dfa6aef45862e76c1c19556e6bf3816750ab7d191
SHA1 hash: d140c9f54972d020ad513a9a6e88ebe6589e2cc2
MD5 hash: 5097ab66c01668d070e5e522a971a561
humanhash: missouri-leopard-moon-bravo
File name:5097AB66C01668D070E5E522A971A561.exe
Download: download sample
Signature BitRAT
File size:2'762'482 bytes
First seen:2021-07-05 21:30:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3abe302b6d9a1256e6a915429af4ffd2 (277 x GuLoader, 38 x Formbook, 25 x Loki)
ssdeep 49152:okNmYG3rYl6RRDDOg3puSiiCn6acMCCLJDsB1QJ0Mcjmjm67kW+:ok/6RFi9n6sNsBGFvm67h+
Threatray 255 similar samples on MalwareBazaar
TLSH 0AD533748565891BC729927D5AE8F97CBE4C9CC4F1D076864BF93ECB393BA20140E34A
Reporter abuse_ch
Tags:BitRAT exe RAT


Avatar
abuse_ch
BitRAT C2:
185.29.11.26:443

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.29.11.26:443 https://threatfox.abuse.ch/ioc/157639/

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5097AB66C01668D070E5E522A971A561.exe
Verdict:
Malicious activity
Analysis date:
2021-07-05 21:32:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected BitRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Solmyr
Status:
Malicious
First seen:
2021-07-03 07:41:38 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:bitrat trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Loads dropped DLL
BitRAT
BitRAT Payload
Unpacked files
SH256 hash:
aee88b812edfe23dcae03c9019661509250ed150fc6d8645085b1aa99f46b172
MD5 hash:
cdeb427bb033e7b94046f3cf76b37b7f
SHA1 hash:
11526eaaaa47a38740eb3a2a26a9e793f78524e0
SH256 hash:
c5f401569bca10252913cb7f35cc02244a0c49fa3a48e0de2ea0dac8e1f518a7
MD5 hash:
bd5a994a03d58aa79bc565e003cf4a85
SHA1 hash:
d1295c5782c4984ea26487ddc5a2276f28b90d4e
SH256 hash:
e64680fcc09a464e9c482987f8727df5d25ec4bbc312db6a51d557178f9ab17a
MD5 hash:
5097ab66c01668d070e5e522a971a561
SHA1 hash:
d140c9f54972d020ad513a9a6e88ebe6589e2cc2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments