Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    29-10-2021 11:13

General

  • Target

    b1fbbb82ba785eb41c3a3ab5bc107e8c.exe

  • Size

    2.6MB

  • MD5

    b1fbbb82ba785eb41c3a3ab5bc107e8c

  • SHA1

    dd054587b966b94abc8e0b7fecb57e4f1713626c

  • SHA256

    4d1b824634586c05b0649513096c57840e8f707f9b8b85d12654f0c8364f20a9

  • SHA512

    4febaef30a0e17827f748fed94445473fcbf8afa559cda7fc761fef58e3e94fa8b68773a8753d32ffdbff8b916119d44bfe71e53d7771825d909313b48524d1e

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • Suspicious use of AdjustPrivilegeToken 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1fbbb82ba785eb41c3a3ab5bc107e8c.exe
    "C:\Users\Admin\AppData\Local\Temp\b1fbbb82ba785eb41c3a3ab5bc107e8c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:296

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/296-115-0x0000000002830000-0x0000000002831000-memory.dmp
    Filesize

    4KB

  • memory/296-116-0x0000000002831000-0x0000000002832000-memory.dmp
    Filesize

    4KB