General

  • Target

    23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60

  • Size

    769KB

  • Sample

    211216-czcg2sbba5

  • MD5

    fd08b4818cca94554574c5e7a3c5a57d

  • SHA1

    64c66820b0caa0bfda38230c269679bd7dbe66ef

  • SHA256

    23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60

  • SHA512

    13591b28b3091386021a8337c058ec84bdce3eb1d59f5b87b2ea043a95d6bc0e8b0440956dbcbb4a67a204283449ce3e76bd7bc24c105306b8bc3ff992175a0c

Malware Config

Extracted

Family

njrat

Botnet

H

C2

dreem.linkpc.net:7500

Attributes
  • splitter

    !'!@!'!

Targets

    • Target

      23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60

    • Size

      769KB

    • MD5

      fd08b4818cca94554574c5e7a3c5a57d

    • SHA1

      64c66820b0caa0bfda38230c269679bd7dbe66ef

    • SHA256

      23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60

    • SHA512

      13591b28b3091386021a8337c058ec84bdce3eb1d59f5b87b2ea043a95d6bc0e8b0440956dbcbb4a67a204283449ce3e76bd7bc24c105306b8bc3ff992175a0c

    • Modifies WinLogon for persistence

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks