Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2023 08:16

General

  • Target

    HEUR-Backdoor.MSIL.Bladabindi.gen-9ef98978c58.exe

  • Size

    1.8MB

  • MD5

    ba00bfba9ed3e725de6fa5b02c948e38

  • SHA1

    ff6c4fa84ed44b488e7d2acc9802f6b092ca4f1e

  • SHA256

    9ef98978c58f868120a005829543bc81136492ac2a53033767b01e8d44b6bb05

  • SHA512

    99a5cdeb654f087353858ac6892862d6410a97e17eaf4f911d87387d4bfe1e87057f8d2ca6775b8f48b93055ec47d2de01e9f186e069aa0464c96e6520f2a064

  • SSDEEP

    49152:EuiPZi3333m3333333333TjgYbAgoPBy:Euix5jgYb5oPBy

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

milla.publicvm.com:5050

Mutex

bc4d1c42bb06

Attributes
  • reg_key

    bc4d1c42bb06

  • splitter

    @!#&^%$

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of AdjustPrivilegeToken 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Backdoor.MSIL.Bladabindi.gen-9ef98978c58.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Backdoor.MSIL.Bladabindi.gen-9ef98978c58.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/900-54-0x0000000000220000-0x00000000003FC000-memory.dmp

    Filesize

    1.9MB

  • memory/900-55-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB

  • memory/900-56-0x0000000000490000-0x000000000049C000-memory.dmp

    Filesize

    48KB