Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    23-12-2020 14:56

General

  • Target

    CA1eebsu.exe

  • Size

    32KB

  • MD5

    e768fe055204fb60c5baace5c7cd6d94

  • SHA1

    1e5acdf31c3db003c0735a506dc8921e0aed4857

  • SHA256

    dd0b7df83d754a6879f4b0ef8297c60844ea63804e4252ddba019d5b5f1423e7

  • SHA512

    9ce8d2998b51e4912216326efe5c08962155cfef99200f12f4fdbfeabb5e28bf34b011db79f38cf1bfe607b80808d90cccc6329ae2ac8b73a869d4f2b3cc376a

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CA1eebsu.exe
    "C:\Users\Admin\AppData\Local\Temp\CA1eebsu.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:576

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads