Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-12-2021 23:46

General

  • Target

    a28656f539450e71284c372b4d8cb1de.exe

  • Size

    20.2MB

  • MD5

    a28656f539450e71284c372b4d8cb1de

  • SHA1

    c7fe2e2399212cff176b732640a08471f8771dba

  • SHA256

    63dec7fa46a8b31f38ec74c9518847f54e570b62b1664f191a596727bf75f22b

  • SHA512

    5e0023d0ed5dca5eb7253048ceba5d88fbdbd03ca471e2b9a40511007f82521b03ce4b6ae726a338869441c9330929eadadffa5479d6af01a0420cf095c0ccf4

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

milla.publicvm.com:5050

Mutex

dd177bd3cca5

Attributes
  • reg_key

    dd177bd3cca5

  • splitter

    @!#&^%$

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a28656f539450e71284c372b4d8cb1de.exe
    "C:\Users\Admin\AppData\Local\Temp\a28656f539450e71284c372b4d8cb1de.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1556-55-0x0000000001220000-0x0000000001342000-memory.dmp

    Filesize

    1.1MB

  • memory/1556-56-0x0000000001220000-0x0000000001342000-memory.dmp

    Filesize

    1.1MB

  • memory/1556-57-0x0000000004B50000-0x0000000004B51000-memory.dmp

    Filesize

    4KB

  • memory/1556-58-0x0000000000E20000-0x0000000000ECA000-memory.dmp

    Filesize

    680KB

  • memory/1556-59-0x0000000000E20000-0x0000000000ECA000-memory.dmp

    Filesize

    680KB

  • memory/1556-60-0x00000000005B0000-0x00000000005BC000-memory.dmp

    Filesize

    48KB