General

  • Target

    5b9c94b55944d98483b6f79e0886baf344f579d4.xlam

  • Size

    17KB

  • Sample

    211103-qs2egsdhd7

  • MD5

    f4ea7a9daa7defa4e9e3c54301f31973

  • SHA1

    5b9c94b55944d98483b6f79e0886baf344f579d4

  • SHA256

    5115b61255546bf812e84d215a21c0257897397669df2dab882bfb29161e698d

  • SHA512

    7f67ed6aa41a22cd8e3b3dedfb6df4fa6a1400a766c2f8b151584e245c896cffc5aa1d52f23e2725066b7526fb82c6df4f2cc0793c94d55892ccd1559ca5662d

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

stayup.sytes.net:1430

Mutex

4aabbfc96630

Attributes
  • reg_key

    4aabbfc96630

  • splitter

    @!#&^%$

Targets

    • Target

      5b9c94b55944d98483b6f79e0886baf344f579d4.xlam

    • Size

      17KB

    • MD5

      f4ea7a9daa7defa4e9e3c54301f31973

    • SHA1

      5b9c94b55944d98483b6f79e0886baf344f579d4

    • SHA256

      5115b61255546bf812e84d215a21c0257897397669df2dab882bfb29161e698d

    • SHA512

      7f67ed6aa41a22cd8e3b3dedfb6df4fa6a1400a766c2f8b151584e245c896cffc5aa1d52f23e2725066b7526fb82c6df4f2cc0793c94d55892ccd1559ca5662d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks