General

  • Target

    D0A927970E230756281222C063F1A06B4637623794A26.exe

  • Size

    10.5MB

  • Sample

    220417-nc45bshbf9

  • MD5

    9e63a0aa4f26539beeccb7180568fc4e

  • SHA1

    649f49bfa20647858a8073a9416648b76773cfc5

  • SHA256

    d0a927970e230756281222c063f1a06b4637623794a26843381e4de3df3c277f

  • SHA512

    a3acd7ec1400ccc482239440450ef8df6719dd29ce6290b9f47764030a4e5b47ceb97ce74c71bb156409848e85ceaa38069d2d4113f4043883ae0a28053a546b

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

SoryMan

C2

us-west-11608.packetriot.net:22794

Mutex

9dc6936092ebce7762ab0f2981bc4ba4

Attributes
  • reg_key

    9dc6936092ebce7762ab0f2981bc4ba4

  • splitter

    @!#&^%$

Targets

    • Target

      D0A927970E230756281222C063F1A06B4637623794A26.exe

    • Size

      10.5MB

    • MD5

      9e63a0aa4f26539beeccb7180568fc4e

    • SHA1

      649f49bfa20647858a8073a9416648b76773cfc5

    • SHA256

      d0a927970e230756281222c063f1a06b4637623794a26843381e4de3df3c277f

    • SHA512

      a3acd7ec1400ccc482239440450ef8df6719dd29ce6290b9f47764030a4e5b47ceb97ce74c71bb156409848e85ceaa38069d2d4113f4043883ae0a28053a546b

    • 44Caliber

      An open source infostealer written in C#.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks