General

  • Target

    2063ccad3a86a5808d3521eff0da421986761ad5d154a5de2243bf03fe59b1f4

  • Size

    1.5MB

  • Sample

    221124-ah2dqshg4x

  • MD5

    35e9fc4bff3729865fcbe688d33e9819

  • SHA1

    74a5dc1856d990634c4c838309f124966c95b145

  • SHA256

    2063ccad3a86a5808d3521eff0da421986761ad5d154a5de2243bf03fe59b1f4

  • SHA512

    483ec08f00f5d3d2620b94f11c6a58f3c936112d189b9208bd6b7f22e285269274d177f12fec461232ede595b80836d883f8965b87cc12ddfe35e1d1849bfdb7

  • SSDEEP

    24576:57OlTY81NmsM4SFu6/4WiAH4ACs/85iIn1xJSG8El7jsMtAndBAicuUO:57cXOAYwGJI1xkwrAXA+

Malware Config

Extracted

Family

bandook

C2

somfiar2a.ddns.net

Targets

    • Target

      2063ccad3a86a5808d3521eff0da421986761ad5d154a5de2243bf03fe59b1f4

    • Size

      1.5MB

    • MD5

      35e9fc4bff3729865fcbe688d33e9819

    • SHA1

      74a5dc1856d990634c4c838309f124966c95b145

    • SHA256

      2063ccad3a86a5808d3521eff0da421986761ad5d154a5de2243bf03fe59b1f4

    • SHA512

      483ec08f00f5d3d2620b94f11c6a58f3c936112d189b9208bd6b7f22e285269274d177f12fec461232ede595b80836d883f8965b87cc12ddfe35e1d1849bfdb7

    • SSDEEP

      24576:57OlTY81NmsM4SFu6/4WiAH4ACs/85iIn1xJSG8El7jsMtAndBAicuUO:57cXOAYwGJI1xkwrAXA+

    • Bandook RAT

      Bandook is a remote access tool written in C++ and shipped with a loader written in Delphi.

    • Bandook payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks