ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool BitRAT

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: BitRAT

NamesBitRAT
CategoryMalware
TypeBackdoor, Info stealer, Credential stealer, Keylogger
Description(Krabs on Security) As is the case with most HF malware, BitRAT is best described as an amalgamation of poorly pasted leaked source code slapped together alongside a fancy C# GUI. It makes heavy uses of libraries such as C++ Standard Library, Boost, OpenCV, and libcurl, as well as code copied directly from leaked malware source code or sites including StackOverflow. The choice of Camellia is somewhat unique, I have not seen this specific algorithm used in malware before.
Information<https://krabsonsecurity.com/2020/08/22/bitrat-the-latest-in-copy-pasted-malware-by-incompetent-developers/>
<https://krabsonsecurity.com/2020/09/04/bitrat-pt-2-hidden-browser-socks5-proxy-and-unknownproducts-unmasked/>
<https://www.trendmicro.com/en_us/research/21/i/apt-c-36-updates-its-long-term-spam-campaign-against-south-ameri.html>
<https://www.fortinet.com/blog/threat-research/nft-lure-used-to-distribute-bitrat>
<https://blog.qualys.com/vulnerabilities-threat-research/2023/01/03/bitrat-now-sharing-sensitive-bank-data-as-a-lure>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.bit_rat>

Last change to this tool card: 15 February 2023

Download this tool card in JSON format

Previous: BitPaymer
Next: Bitsran

All groups using tool BitRAT

ChangedNameCountryObserved

APT groups

XBlind EagleColombia2018-Jun 2024 
 OPERA1ER[Unknown]2016-Jul 2023X

2 groups listed (2 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]