General

  • Target

    Extreme.Injector.v2.4.5.-.by.master131.exe

  • Size

    164KB

  • Sample

    221205-yw3qqafa2v

  • MD5

    2fd45c4572749ca9537fde2dadf1b8dd

  • SHA1

    77fce1f2295d640962321c15e628f374525f6689

  • SHA256

    f370694edebc6fea374b0ff45057d3d81d697422972c51ec9a27ab531cd39b3b

  • SHA512

    7bfae6a212ddd96f58253960d5ddfdb217a1a39674e4927c43637a90466a841229303f080fbbce97e6dc30eb4b1b47909fa965072219ab6b35e7fd86e763a31f

  • SSDEEP

    3072:hodc4/cHmSPrcerD+fR6DBBLzy7zRJZGuQkIJ4gRqE2uIE28uEwBZSZbM1hePf:mdHeDtUZabmO

Malware Config

Targets

    • Target

      Extreme.Injector.v2.4.5.-.by.master131.exe

    • Size

      164KB

    • MD5

      2fd45c4572749ca9537fde2dadf1b8dd

    • SHA1

      77fce1f2295d640962321c15e628f374525f6689

    • SHA256

      f370694edebc6fea374b0ff45057d3d81d697422972c51ec9a27ab531cd39b3b

    • SHA512

      7bfae6a212ddd96f58253960d5ddfdb217a1a39674e4927c43637a90466a841229303f080fbbce97e6dc30eb4b1b47909fa965072219ab6b35e7fd86e763a31f

    • SSDEEP

      3072:hodc4/cHmSPrcerD+fR6DBBLzy7zRJZGuQkIJ4gRqE2uIE28uEwBZSZbM1hePf:mdHeDtUZabmO

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks