General

  • Target

    virus.exe

  • Size

    37KB

  • Sample

    240420-te21mscc22

  • MD5

    fa6f3f80eb4e48037e6b17b58a29ec1a

  • SHA1

    67afa313184f283e2b2e352c5c06bbe087c1db5c

  • SHA256

    a137aa68c256f14ab43900828fe890561a893d64fdc4cf7c82ad73e31d3f6d10

  • SHA512

    7222b8f428aac84b9eb5794776f7f3c0d0aa1d9fec59392f1e9dff7643c1f8f9b4f0e307915dc445970ca002f48cfa9b2c7f3a05db6fe91839b888632be12d8c

  • SSDEEP

    384:IRmjKicg+jn5xL5oyUi8ithMjnP9KYC2DhrAF+rMRTyN/0L+EcoinblneHQM3ept:GmIf5DUi8GMjng12lrM+rMRa8NuDdt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Bezmamniy

C2

basic-values.gl.at.ply.gg:58503

Mutex

4b6699ab871e1185d9ebf603d91d567c

Attributes
  • reg_key

    4b6699ab871e1185d9ebf603d91d567c

  • splitter

    |'|'|

Targets

    • Target

      virus.exe

    • Size

      37KB

    • MD5

      fa6f3f80eb4e48037e6b17b58a29ec1a

    • SHA1

      67afa313184f283e2b2e352c5c06bbe087c1db5c

    • SHA256

      a137aa68c256f14ab43900828fe890561a893d64fdc4cf7c82ad73e31d3f6d10

    • SHA512

      7222b8f428aac84b9eb5794776f7f3c0d0aa1d9fec59392f1e9dff7643c1f8f9b4f0e307915dc445970ca002f48cfa9b2c7f3a05db6fe91839b888632be12d8c

    • SSDEEP

      384:IRmjKicg+jn5xL5oyUi8ithMjnP9KYC2DhrAF+rMRTyN/0L+EcoinblneHQM3ept:GmIf5DUi8GMjng12lrM+rMRa8NuDdt

    Score
    8/10
    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Installed Components in the registry

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks