General

  • Target

    X.exe

  • Size

    412KB

  • Sample

    230917-k6nsnagg8x

  • MD5

    5bae6910d4e57bea5701e8ce7bbf887b

  • SHA1

    6e13b96f5fe6d3711d9f393bcd87039d249c40e3

  • SHA256

    bcf7b9013a302a689c641ee7740c7cbdcf6f88d30f27df8e10b99b9ed7498610

  • SHA512

    c459a39bf87f956b635f0451e5c0402718e9b13f4d4035b357e2849821dd30597422e260fc5bc8926271d20f1c1e7fc03599bc05c67723dab5f37291da0ddaf7

  • SSDEEP

    6144:TMVHn9ERoEd138M50fVdK0uiXfLg/U9Kgl2GNmajtrIzEii6aoCUTK1zaHyiRm8O:TMdnCHX5mV46TfPIs7izrC04z5e

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

USB

C2

127.0.0.1:54077

Mutex

cmd.exe

Attributes
  • reg_key

    cmd.exe

  • splitter

    |Ghost|

Extracted

Family

darkcomet

Botnet

Server

C2

win.host.ru:8080

Mutex

DC_MUTEX-EPZW3NE

Attributes
  • InstallPath

    NvDriver\NvUpdate.exe

  • gencode

    8bfjgRu0pWjn

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    DriverUpdater

Targets

    • Target

      X.exe

    • Size

      412KB

    • MD5

      5bae6910d4e57bea5701e8ce7bbf887b

    • SHA1

      6e13b96f5fe6d3711d9f393bcd87039d249c40e3

    • SHA256

      bcf7b9013a302a689c641ee7740c7cbdcf6f88d30f27df8e10b99b9ed7498610

    • SHA512

      c459a39bf87f956b635f0451e5c0402718e9b13f4d4035b357e2849821dd30597422e260fc5bc8926271d20f1c1e7fc03599bc05c67723dab5f37291da0ddaf7

    • SSDEEP

      6144:TMVHn9ERoEd138M50fVdK0uiXfLg/U9Kgl2GNmajtrIzEii6aoCUTK1zaHyiRm8O:TMdnCHX5mV46TfPIs7izrC04z5e

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables RegEdit via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks