General

  • Target

    Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendientes de pago correspondientes SE DECLARAN EMBARGADOS.vbs

  • Size

    205KB

  • Sample

    220811-rvtm4agcgr

  • MD5

    173a182f65910267fa0e8590dd0cfc0e

  • SHA1

    3b8bf6b2f4ad725511fca0e0198b4499c75fe86c

  • SHA256

    49bb9b1be17a3b590a8cb4245e1a3f07fb13648676ff7e0240f3030678c503d6

  • SHA512

    44d5a9a9d2166253c2af4b8820f323d29a2cd7042a3408440bd86b8422d25a28006891ca9f690d756271e85d09965047c2eebcbd18b5af8a378ff0785924900d

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://91.241.19.49/ARTS/dllf3txt

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

wibnj.duckdns.org:57831

Mutex

549d524552

Attributes
  • reg_key

    549d524552

  • splitter

    @!#&^%$

Targets

    • Target

      Su contraseña es 118 Tramitándose expediente administrativo para el cobro de sus deudas pendientes de pago correspondientes SE DECLARAN EMBARGADOS.vbs

    • Size

      205KB

    • MD5

      173a182f65910267fa0e8590dd0cfc0e

    • SHA1

      3b8bf6b2f4ad725511fca0e0198b4499c75fe86c

    • SHA256

      49bb9b1be17a3b590a8cb4245e1a3f07fb13648676ff7e0240f3030678c503d6

    • SHA512

      44d5a9a9d2166253c2af4b8820f323d29a2cd7042a3408440bd86b8422d25a28006891ca9f690d756271e85d09965047c2eebcbd18b5af8a378ff0785924900d

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks