Skip to content

Bitrat C2 - Detect

ID: bitrat-c2

Severity: info

Author: pussycat0x

Tags: ssl,tls,c2,ir,osint,malware,bitrat

BitRAT is a fairly recent, notorious remote access trojan (RAT) marketed on underground cybercriminal web markets and forums since Feb 2021. The RAT is particularly well known for its social media presence and functionality such as: Data exfiltration. Execution of payloads with bypasses.

id: bitrat-c2
info:
name: Bitrat C2 - Detect
author: pussycat0x
severity: info
description: |
BitRAT is a fairly recent, notorious remote access trojan (RAT) marketed on underground cybercriminal web markets and forums since Feb 2021. The RAT is particularly well known for its social media presence and functionality such as: Data exfiltration. Execution of payloads with bypasses.
reference: |
https://github.com/thehappydinoa/awesome-censys-queries#bitrat--
metadata:
verified: "true"
max-request: 1
censys-query: 'services.tls.certificates.leaf_data.subject.common_name: "BitRAT"'
tags: ssl,tls,c2,ir,osint,malware,bitrat
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
- type: word
part: issuer_cn
words:
- "BitRAT"
extractors:
- type: json
json:
- ".issuer_cn"
# digest: 4a0a00473045022014fbd82631db320231245a3391ad01602a67f948b6fe8c4b6515f961dceef109022100f9a1aed6c7d33e4021ce48c98edeb50a3703488e22832fae61269aeab12082af:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "ssl/c2/bitrat-c2.yaml"

View on Github