General

  • Target

    963803dcef236cc0f71da95c3e36eada9c7e310520059999142a5ae59a93b8bc

  • Size

    1013KB

  • Sample

    221107-ew83ysaffr

  • MD5

    0e3f81a423baa274806728d1a7aad630

  • SHA1

    45f1b3b2dd8ea9b3508f85902e406d354adcf27a

  • SHA256

    963803dcef236cc0f71da95c3e36eada9c7e310520059999142a5ae59a93b8bc

  • SHA512

    71c81404a747c2b20dc18bd8eda29134c3a7c8c006458d7d6720e8792a83dcea384925af7f1b64401cb36099f6ccd87f11eb2c4c59b59634f55555cd9456a719

  • SSDEEP

    24576:AdALd1TMTYB77iOxyrprYr2tZSdR9NIKWDuzIimRXZKQz0pfcqPrV:AdITMT6hwrprYr2edR9mVDuERXZThC

Malware Config

Extracted

Family

bandook

C2

hassankanbar.ddns.net

Targets

    • Target

      963803dcef236cc0f71da95c3e36eada9c7e310520059999142a5ae59a93b8bc

    • Size

      1013KB

    • MD5

      0e3f81a423baa274806728d1a7aad630

    • SHA1

      45f1b3b2dd8ea9b3508f85902e406d354adcf27a

    • SHA256

      963803dcef236cc0f71da95c3e36eada9c7e310520059999142a5ae59a93b8bc

    • SHA512

      71c81404a747c2b20dc18bd8eda29134c3a7c8c006458d7d6720e8792a83dcea384925af7f1b64401cb36099f6ccd87f11eb2c4c59b59634f55555cd9456a719

    • SSDEEP

      24576:AdALd1TMTYB77iOxyrprYr2tZSdR9NIKWDuzIimRXZKQz0pfcqPrV:AdITMT6hwrprYr2edR9mVDuERXZThC

    • Bandook RAT

      Bandook is a remote access tool written in C++ and shipped with a loader written in Delphi.

    • Bandook payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks