General

  • Target

    New folder.rar

  • Size

    6.9MB

  • Sample

    230304-14sltsed4z

  • MD5

    27f8ef3eb1c6fdbe295174f4fa4ea19c

  • SHA1

    4e5768610fd41604c906729f866d4b97e7dbb276

  • SHA256

    a86957ee594e57dfdf8ffdee89b6ad7465212c8724f5cf524983bee81ea74506

  • SHA512

    94168abe57cf20fb20c17ca1d24aa1395c06d3eb1582f490d967b84b9b025d0613474b0878f375f7d75aa76ba876bee3fa285916090d108ad8324da44bbbab4b

  • SSDEEP

    196608:fYlj8zcAEYvZ4qhytYPoURanwftLalial8:fwAdB4q0WwKanwhaliR

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

HacKed

C2

according-psp.at.ply.gg:38979

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

mayo21.duckdns.org:2815

Mutex

5be64674f6c

Attributes
  • reg_key

    5be64674f6c

  • splitter

    @!#&^%$

Extracted

Family

njrat

Version

0.7d

Botnet

hackpack

C2

cryptoban.ddns.net:7080

Mutex

614f5b9de3a2d1c0768b788aac77a023

Attributes
  • reg_key

    614f5b9de3a2d1c0768b788aac77a023

  • splitter

    |'|'|

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

FRANSESCOTkyLjE2OC4wLjEwNwStrikStrik:NTU1Mg==

Mutex

0a12c200b51a3f61d5cce2fd62c96311

Attributes
  • reg_key

    0a12c200b51a3f61d5cce2fd62c96311

  • splitter

    |'|'|

Extracted

Family

bitrat

Version

1.38

C2

185.81.157.28:2030

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Extracted

Family

remcos

Botnet

RemoteHost

C2

127.0.0.1:56932

185.65.134.165:56932

10.16.0.30:56932

45.128.234.54:56932

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-JRDLY5

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

asyncrat

Version

0.5.7A

Botnet

Default

C2

163.172.225.185:6606

163.172.225.185:7707

163.172.225.185:8808

Mutex

ttseuezglyey

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      New folder.rar

    • Size

      6.9MB

    • MD5

      27f8ef3eb1c6fdbe295174f4fa4ea19c

    • SHA1

      4e5768610fd41604c906729f866d4b97e7dbb276

    • SHA256

      a86957ee594e57dfdf8ffdee89b6ad7465212c8724f5cf524983bee81ea74506

    • SHA512

      94168abe57cf20fb20c17ca1d24aa1395c06d3eb1582f490d967b84b9b025d0613474b0878f375f7d75aa76ba876bee3fa285916090d108ad8324da44bbbab4b

    • SSDEEP

      196608:fYlj8zcAEYvZ4qhytYPoURanwftLalial8:fwAdB4q0WwKanwhaliR

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Async RAT payload

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

4
T1112

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

2
T1005

Impact

Defacement

1
T1491

Tasks