General

  • Target

    bc1df94edc704d4be73eb5e91c2331be.vbs

  • Size

    151KB

  • Sample

    211221-sdctpaefbq

  • MD5

    bc1df94edc704d4be73eb5e91c2331be

  • SHA1

    18d6f490b6a99d8a17df13c0bd037fd56e215d8c

  • SHA256

    946bd0343beb66996e777f0f7b83143053aa574ddaae249fae927795891a0363

  • SHA512

    1c6af4ec257a33e365dc43b278fbbbd4e127cfe1b89974c871425b8165b30c374707eac15deaeb7b4bb869159d9d4271951dc7ce28cf062f9c147278018b1d61

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://91.241.19.49/ramdes/DownloaderF3.txt

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

revg.duckdns.org:57831

Mutex

ebef4abe57d24e8

Attributes
  • reg_key

    ebef4abe57d24e8

  • splitter

    @!#&^%$

Targets

    • Target

      bc1df94edc704d4be73eb5e91c2331be.vbs

    • Size

      151KB

    • MD5

      bc1df94edc704d4be73eb5e91c2331be

    • SHA1

      18d6f490b6a99d8a17df13c0bd037fd56e215d8c

    • SHA256

      946bd0343beb66996e777f0f7b83143053aa574ddaae249fae927795891a0363

    • SHA512

      1c6af4ec257a33e365dc43b278fbbbd4e127cfe1b89974c871425b8165b30c374707eac15deaeb7b4bb869159d9d4271951dc7ce28cf062f9c147278018b1d61

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Blocklisted process makes network request

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks