MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fed274cef763ebf2558db00b7e25a4a9e51c986d55ea6c089d32893d666fe29d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BitRAT


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 3 File information Comments

SHA256 hash: fed274cef763ebf2558db00b7e25a4a9e51c986d55ea6c089d32893d666fe29d
SHA3-384 hash: 555957e7a3c3c53b8ea66b0dd4d4596eb60090b7790d9c36fd149997e76727f96d932524f030fd0cf4f3c6bb7de368e1
SHA1 hash: ac6591ba4b69374e9a2a2c3b38e7e4b8047d1b88
MD5 hash: 46653475aa183d9805bd8c014d3d3e81
humanhash: bulldog-double-sweet-july
File name:46653475AA183D9805BD8C014D3D3E81.exe
Download: download sample
Signature BitRAT
File size:1'920'512 bytes
First seen:2021-06-26 20:01:09 UTC
Last seen:2021-06-26 20:35:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 49152:dnaVVMxDQa644u0PpzIoMuHR757NqZsdyS:dna4xDQTu0PpNv52sT
Threatray 247 similar samples on MalwareBazaar
TLSH 0295F26E15F0AE3EF90981B710CB8D0C1EE8AD717A8BFA5EB76E1C510F10514EB0E596
Reporter abuse_ch
Tags:BitRAT exe RAT


Avatar
abuse_ch
BitRAT C2:
212.192.241.95:45001

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
212.192.241.95:45001 https://threatfox.abuse.ch/ioc/73639/

Intelligence


File Origin
# of uploads :
2
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
46653475AA183D9805BD8C014D3D3E81.exe
Verdict:
Suspicious activity
Analysis date:
2021-06-26 20:04:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitRAT Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Contains functionality to hide a thread from the debugger
Contains functionality to inject code into remote processes
Creates files in alternative data streams (ADS)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected BitRAT
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 440906 Sample: JJqDaVxOwq.exe Startdate: 26/06/2021 Architecture: WINDOWS Score: 100 44 www.xenarmor.com 2->44 46 xenarmor.com 2->46 48 khnp-kr.co 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 Yara detected BitRAT 2->52 54 Yara detected Xmrig cryptocurrency miner 2->54 56 3 other signatures 2->56 9 JJqDaVxOwq.exe 4 10 2->9         started        13 alm.exe 2 2->13         started        15 alm.exe 2->15         started        signatures3 process4 file5 32 C:\Users\user\AppData\Roaming\alm\alm.exe, PE32 9->32 dropped 34 C:\Users\user\AppData\...\JJqDaVxOwq.exe, PE32 9->34 dropped 36 C:\Users\user\...\alm.exe:Zone.Identifier, ASCII 9->36 dropped 38 3 other malicious files 9->38 dropped 70 Writes to foreign memory regions 9->70 72 Injects a PE file into a foreign processes 9->72 17 JJqDaVxOwq.exe 1 4 9->17         started        22 wscript.exe 1 9->22         started        74 Multi AV Scanner detection for dropped file 13->74 76 Machine Learning detection for dropped file 13->76 signatures6 process7 dnsIp8 40 khnp-kr.co 212.192.241.95, 45001, 49733, 49742 RAPMSB-ASRU Russian Federation 17->40 42 192.168.2.1 unknown unknown 17->42 30 C:\Users\user\AppData\Local:27-06-2021, ASCII 17->30 dropped 58 Multi AV Scanner detection for dropped file 17->58 60 Creates files in alternative data streams (ADS) 17->60 62 Machine Learning detection for dropped file 17->62 68 4 other signatures 17->68 24 JJqDaVxOwq.exe 17->24         started        64 Wscript starts Powershell (via cmd or directly) 22->64 66 Adds a directory exclusion to Windows Defender 22->66 26 powershell.exe 24 22->26         started        file9 signatures10 process11 process12 28 conhost.exe 26->28         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-06-24 11:47:14 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
xenarmor
Score:
  10/10
Tags:
family:bitrat family:xenarmor password persistence recovery spyware stealer trojan upx
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Reads data files stored by FTP clients
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
UPX packed file
ACProtect 1.3x - 1.4x DLL software
BitRAT
BitRAT Payload
XenArmor Suite
Unpacked files
SH256 hash:
92fffde5ece93fe0e51b37e300e43c173712897ec88afc9060eedbfe08e1bb56
MD5 hash:
1517e264254b0d4b4d42033a2d27de92
SHA1 hash:
561d9d970b357b0298bc5b171b61f7ec71519fea
SH256 hash:
d02f42ef840c1920d9063e1d8f9ee2ae925d2594213513fd85c9cafb95a0e68a
MD5 hash:
45c8e2f8b8913394e5e1491b5484c3ae
SHA1 hash:
ad645bc1c97f042d80d7b88f84db242acca3a18e
SH256 hash:
834844c216a0f57a49546ec19dabc949603593911768dddd9830520a5eceb891
MD5 hash:
e56098b8cf6b6e0b6813440aaa65dddd
SHA1 hash:
2fc3afd2c13d72432d103a02cda4f15b95bdeb3e
SH256 hash:
fed274cef763ebf2558db00b7e25a4a9e51c986d55ea6c089d32893d666fe29d
MD5 hash:
46653475aa183d9805bd8c014d3d3e81
SHA1 hash:
ac6591ba4b69374e9a2a2c3b38e7e4b8047d1b88
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments