Resubmissions

24-04-2024 21:15

240424-z3287shf9z 10

24-04-2024 21:12

240424-z15xbahf6x 10

General

  • Target

    hello.exe

  • Size

    37KB

  • Sample

    240424-z3287shf9z

  • MD5

    5931168ab3f8c4226c8f44d2b8c26296

  • SHA1

    9f8c71374117a458325f9d3e2eac5a09ec828537

  • SHA256

    4d305cb4251ef38bad499f0e12a00e6e8dc6a7e208510178b3adce1572591770

  • SHA512

    78f94dc5fc9f0189c7eb76b9aecf6795dfbaf6827d3d8f9e82ca50882315c895dcc8663bb6a3a97b4877e253dc1c8ef9f4cf5d24149554a63b25df5d124c743d

  • SSDEEP

    384:cWw0CT0i9RdTe/kCOyU75C3fSDH5iiurAF+rMRTyN/0L+EcoinblneHQM3epzXVw:3w5f1CFU75CqD5idrM+rMRa8Nu7wt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

02c1bd2f5aa7f16a11ec8e0261527671

Attributes
  • reg_key

    02c1bd2f5aa7f16a11ec8e0261527671

  • splitter

    |'|'|

Targets

    • Target

      hello.exe

    • Size

      37KB

    • MD5

      5931168ab3f8c4226c8f44d2b8c26296

    • SHA1

      9f8c71374117a458325f9d3e2eac5a09ec828537

    • SHA256

      4d305cb4251ef38bad499f0e12a00e6e8dc6a7e208510178b3adce1572591770

    • SHA512

      78f94dc5fc9f0189c7eb76b9aecf6795dfbaf6827d3d8f9e82ca50882315c895dcc8663bb6a3a97b4877e253dc1c8ef9f4cf5d24149554a63b25df5d124c743d

    • SSDEEP

      384:cWw0CT0i9RdTe/kCOyU75C3fSDH5iiurAF+rMRTyN/0L+EcoinblneHQM3epzXVw:3w5f1CFU75CqD5idrM+rMRa8Nu7wt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks