General

  • Target

    RFQ-474552121.PDF.vbs

  • Size

    703KB

  • Sample

    211019-r4qmssghep

  • MD5

    cd9e1d38735dac32cc6d16d56f77e245

  • SHA1

    9d0e49e52bca6b5d31e0a40775c7f1dcef782357

  • SHA256

    6b3856d5dfd5daf70c0866277b3da2471fafe302698fd7858cacb074edcc83b0

  • SHA512

    c31ed9bd8788dea045b04752cbbde230f239eba8784204920e6b0aeeca3be495927c9e1d96477d2ee09721645fe5076bc43cbfa9537b2394a4a8fd3aa57f3f21

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

------(FaceBook)------

C2

new.libya2020.com.ly:2020

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      RFQ-474552121.PDF.vbs

    • Size

      703KB

    • MD5

      cd9e1d38735dac32cc6d16d56f77e245

    • SHA1

      9d0e49e52bca6b5d31e0a40775c7f1dcef782357

    • SHA256

      6b3856d5dfd5daf70c0866277b3da2471fafe302698fd7858cacb074edcc83b0

    • SHA512

      c31ed9bd8788dea045b04752cbbde230f239eba8784204920e6b0aeeca3be495927c9e1d96477d2ee09721645fe5076bc43cbfa9537b2394a4a8fd3aa57f3f21

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks