Resubmissions

03-06-2023 12:21

230603-pjc5vsgf78 10

03-06-2023 12:12

230603-pdlvtagf72 10

General

  • Target

    Client.exe

  • Size

    31KB

  • Sample

    230603-pjc5vsgf78

  • MD5

    904777d0f18496bdb0aa9e87bd42e685

  • SHA1

    224478a50efd6e18bab2617a9e81c06da3a94e27

  • SHA256

    7daca7d7ea3721fef0096c1d9d4d33cd6d55c7155b20be64db4fae168eb74945

  • SHA512

    5d7a89caf14980a4c4dcda9078f1a9261f0b71d11456913d403d27fa86b75e09e3cc0697d12237e3560aecf75395bab102b6e87976835178f6ccd1a538c23e1b

  • SSDEEP

    768:crhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti7Saj:ucZ6eh6gQVka5j

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

wdex.ddns.net:8080

Mutex

53218de73abc0726366574c218ecf267

Attributes
  • reg_key

    53218de73abc0726366574c218ecf267

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      Client.exe

    • Size

      31KB

    • MD5

      904777d0f18496bdb0aa9e87bd42e685

    • SHA1

      224478a50efd6e18bab2617a9e81c06da3a94e27

    • SHA256

      7daca7d7ea3721fef0096c1d9d4d33cd6d55c7155b20be64db4fae168eb74945

    • SHA512

      5d7a89caf14980a4c4dcda9078f1a9261f0b71d11456913d403d27fa86b75e09e3cc0697d12237e3560aecf75395bab102b6e87976835178f6ccd1a538c23e1b

    • SSDEEP

      768:crhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti7Saj:ucZ6eh6gQVka5j

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

3
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

3
T1112

File Permissions Modification

1
T1222

Install Root Certificate

1
T1130

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

6
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks