General

  • Target

    Screamer.exe

  • Size

    88KB

  • Sample

    240526-3gxndaga6v

  • MD5

    8db06db3366d01649ad9cb8394bb2c3d

  • SHA1

    7c9ead39aa6b1bd0557ae9ce65f1b398cc6abb9a

  • SHA256

    00d72c44db13083301639d910551e55241ee3d11ec93bd4178651bd78ef54c33

  • SHA512

    893c703942e5989680f892af337ecfad5ca94aea38c272a3fde8533000a35ba0b7436a524f59831defd5f78ebd46bec92c4c6bbc2f1f7a88c658aa47587c15a1

  • SSDEEP

    1536:JxqjQ+P04wsmJCdN/Gb6EAyVRYt/uF/bQf8b0VbKL5PnrbxVcnV51Q:sr85Cqb6EBVRYZMTnuK9PnZCnm

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

popka

C2

185.204.1.236:8648

Mutex

73669228637201240c020112fc761ef3

Attributes
  • reg_key

    73669228637201240c020112fc761ef3

  • splitter

    |'|'|

Targets

    • Target

      Screamer.exe

    • Size

      88KB

    • MD5

      8db06db3366d01649ad9cb8394bb2c3d

    • SHA1

      7c9ead39aa6b1bd0557ae9ce65f1b398cc6abb9a

    • SHA256

      00d72c44db13083301639d910551e55241ee3d11ec93bd4178651bd78ef54c33

    • SHA512

      893c703942e5989680f892af337ecfad5ca94aea38c272a3fde8533000a35ba0b7436a524f59831defd5f78ebd46bec92c4c6bbc2f1f7a88c658aa47587c15a1

    • SSDEEP

      1536:JxqjQ+P04wsmJCdN/Gb6EAyVRYt/uF/bQf8b0VbKL5PnrbxVcnV51Q:sr85Cqb6EBVRYZMTnuK9PnZCnm

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks