General

  • Target

    98d5dd6c09fa093e791e3c18a9526859.exe

  • Size

    307KB

  • Sample

    210418-ym5pwf4mqj

  • MD5

    98d5dd6c09fa093e791e3c18a9526859

  • SHA1

    758dbd528a61ac56767fab89600c1656d20693bd

  • SHA256

    a045c1cc2b85a5106a89a970262a3ba07dc65d96573401f1f31b4f9867ba7130

  • SHA512

    bc4c4875694b7f6d9e01712a6b9e86352bd1350acb4357031c4a688af9b942835cb52e36ff35ffef3f639eb6fd372c8deb8aa0bb48aadf0ed4b376aa1035882a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://34.126.93.163/xm/win.com

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://34.126.93.163/xm/64a1.com

Extracted

Family

njrat

Version

0.7d

Botnet

=========6.10==========

C2

niogem117.soon.it:11061

Mutex

af9ce263479113682e318a01223de94a

Attributes
  • reg_key

    af9ce263479113682e318a01223de94a

  • splitter

    |'|'|

Extracted

Family

limerat

Wallets

38ZggxKrjJSn9XmS8sM1iTQhX3K6ny5u6E

Attributes
  • aes_key

    beodz

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/nEZ87Pwx

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    svchost.exe

  • main_folder

    AppData

  • pin_spread

    true

  • sub_folder

    \MicrosoftData\

  • usb_spread

    false

Targets

    • Target

      98d5dd6c09fa093e791e3c18a9526859.exe

    • Size

      307KB

    • MD5

      98d5dd6c09fa093e791e3c18a9526859

    • SHA1

      758dbd528a61ac56767fab89600c1656d20693bd

    • SHA256

      a045c1cc2b85a5106a89a970262a3ba07dc65d96573401f1f31b4f9867ba7130

    • SHA512

      bc4c4875694b7f6d9e01712a6b9e86352bd1350acb4357031c4a688af9b942835cb52e36ff35ffef3f639eb6fd372c8deb8aa0bb48aadf0ed4b376aa1035882a

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Modify Existing Service

1
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Tasks