General

  • Target

    July2020_SGD894_CODE_850.doc

  • Size

    43KB

  • Sample

    210510-p9dbbphsca

  • MD5

    2a8f04ddc03f8c4db0821275619b55b4

  • SHA1

    8bf21477518f4f33bbd9f1a0f013302be516ea53

  • SHA256

    531471184d5c8eb4ec97c12059b5bbc8f397b3749033f7fd80405a1b560fbb17

  • SHA512

    27eb081ce75ae5015adc7368b109fd82b6fa7dfab627a4faa0a8cc43aa83385f75906e463b1a0cde23490f0274c150578c923c2fe3e9d2eec9e26492fd717c43

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://meetthepriestessatl.com/August2020.exe

Extracted

Family

njrat

Version

0.7d

Botnet

2021$$$

C2

194.5.98.210:4040

Mutex

0ef5de3f5b1fb89677ba03e41fa0a05a

Attributes
  • reg_key

    0ef5de3f5b1fb89677ba03e41fa0a05a

  • splitter

    |'|'|

Targets

    • Target

      July2020_SGD894_CODE_850.doc

    • Size

      43KB

    • MD5

      2a8f04ddc03f8c4db0821275619b55b4

    • SHA1

      8bf21477518f4f33bbd9f1a0f013302be516ea53

    • SHA256

      531471184d5c8eb4ec97c12059b5bbc8f397b3749033f7fd80405a1b560fbb17

    • SHA512

      27eb081ce75ae5015adc7368b109fd82b6fa7dfab627a4faa0a8cc43aa83385f75906e463b1a0cde23490f0274c150578c923c2fe3e9d2eec9e26492fd717c43

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks