General

  • Target

    78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575

  • Size

    1.5MB

  • Sample

    221125-tbjd5ahd94

  • MD5

    448aba4a116723c528154cdd23545490

  • SHA1

    04bb39f49e80ae8b23603df44a0b7f857bac9f44

  • SHA256

    78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575

  • SHA512

    1055fed4a85dff3aeb0d88322164680355af8f6e72ec44fc1c07e0310c82d14dd90ac376f1a0d416e1e11482aa1198148b5d2e6a73b8b6a344f3db053a65140f

  • SSDEEP

    24576:aqtusu+tVxHPidqUAIM3CNQgII6SZlCDHh3R5ZdBAq8yN8tMG6:aZwd4MbyZlUBB5xAql

Malware Config

Extracted

Family

bandook

C2

sandykarakas.ddns.net

Targets

    • Target

      78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575

    • Size

      1.5MB

    • MD5

      448aba4a116723c528154cdd23545490

    • SHA1

      04bb39f49e80ae8b23603df44a0b7f857bac9f44

    • SHA256

      78d8be0c162fc2ef33a4357a3a1ac82d42e773c8f87406d2e678dcefa80b4575

    • SHA512

      1055fed4a85dff3aeb0d88322164680355af8f6e72ec44fc1c07e0310c82d14dd90ac376f1a0d416e1e11482aa1198148b5d2e6a73b8b6a344f3db053a65140f

    • SSDEEP

      24576:aqtusu+tVxHPidqUAIM3CNQgII6SZlCDHh3R5ZdBAq8yN8tMG6:aZwd4MbyZlUBB5xAql

    • Bandook RAT

      Bandook is a remote access tool written in C++ and shipped with a loader written in Delphi.

    • Bandook payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks