General

  • Target

    5afd70d54cc4af7f236894d674842493

  • Size

    776KB

  • Sample

    211018-l1tmdsecen

  • MD5

    5afd70d54cc4af7f236894d674842493

  • SHA1

    6565657adebd3063ba85886e551e551b0bbd6fdb

  • SHA256

    8b79e79f75578ab62d83e89b6bfaf5404fa868041b880995579f3cd6ae6f995e

  • SHA512

    6fa7daafcd661d873bae7e092fab5c89f8a56978003d31b3b91eabc735e50ecc01b8e90f90fbcec193c0656f134b6ce69c98825cfbaeaa07a536ddc5eea641fa

Malware Config

Extracted

Family

njrat

Version

Carbonblack2102

Botnet

batvoi

C2

1368.vnh.wtf:5552

Mutex

0de45b5c6627a3e65a4b2a1e68ec841b

Attributes
  • reg_key

    0de45b5c6627a3e65a4b2a1e68ec841b

  • splitter

    |'|'|

Targets

    • Target

      5afd70d54cc4af7f236894d674842493

    • Size

      776KB

    • MD5

      5afd70d54cc4af7f236894d674842493

    • SHA1

      6565657adebd3063ba85886e551e551b0bbd6fdb

    • SHA256

      8b79e79f75578ab62d83e89b6bfaf5404fa868041b880995579f3cd6ae6f995e

    • SHA512

      6fa7daafcd661d873bae7e092fab5c89f8a56978003d31b3b91eabc735e50ecc01b8e90f90fbcec193c0656f134b6ce69c98825cfbaeaa07a536ddc5eea641fa

    • Taurus Stealer

      Taurus is an infostealer first seen in June 2020.

    • Taurus Stealer Payload

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks