General

  • Target

    derka.exe

  • Size

    445KB

  • Sample

    240725-l9zj1awarf

  • MD5

    0fafabbbe5a6a1dae88df02e453ac23b

  • SHA1

    2e0118d3f51c320d759006ef80f2aecd4f9184ab

  • SHA256

    8fb481dadb1d763ba6e666ea1f5d89bc66e23a09e8e1c8705dc6c2f8ae891ee9

  • SHA512

    27b35c404f8e9f2beedce1af87d5e8c2cad3bf248c604082f263ed14512ece1fa978e89e9582bc1ad29fa4c17cefb65997b448f73c763ac2184ac123465f8213

  • SSDEEP

    12288:nOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPijggFE:nq5TfcdHj4fmbqFE

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

insurance-helmet.gl.at.ply.gg:31388

Mutex

82104ae3464ef515625a324e803cdcd6

Attributes
  • reg_key

    82104ae3464ef515625a324e803cdcd6

  • splitter

    |'|'|

Targets

    • Target

      derka.exe

    • Size

      445KB

    • MD5

      0fafabbbe5a6a1dae88df02e453ac23b

    • SHA1

      2e0118d3f51c320d759006ef80f2aecd4f9184ab

    • SHA256

      8fb481dadb1d763ba6e666ea1f5d89bc66e23a09e8e1c8705dc6c2f8ae891ee9

    • SHA512

      27b35c404f8e9f2beedce1af87d5e8c2cad3bf248c604082f263ed14512ece1fa978e89e9582bc1ad29fa4c17cefb65997b448f73c763ac2184ac123465f8213

    • SSDEEP

      12288:nOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPijggFE:nq5TfcdHj4fmbqFE

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks