General

  • Target

    Systeminteracts (32 bit).exe

  • Size

    37KB

  • Sample

    240726-hgw2masbrm

  • MD5

    fb3f9f675ace4b0e2e3938b40b4a016e

  • SHA1

    e45bd61c9830bbdaa413f1e5addf2e05c9ccfd6e

  • SHA256

    d2673072e29073998e65da0023a0f4f6d96493ecdfbfee84b044b1947eef11d5

  • SHA512

    ebd2ff3940962155c9ee78dced5a2a2967f81084707e111a47af7fc60109996f4c87ab962c3deac1336464677b99cb48ea3ef76315cedcfd68232678439505f9

  • SSDEEP

    384:ISAjrUiS6L1G5k2gyk/8If5e/QUZSiKrAF+rMRTyN/0L+EcoinblneHQM3epzXr6:sjz32bk/8IQYUZStrM+rMRa8Nutqt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

20.ip.gl.ply.gg:55257

Mutex

319c1637f1925d788496e1f3109ae4f7

Attributes
  • reg_key

    319c1637f1925d788496e1f3109ae4f7

  • splitter

    |'|'|

Targets

    • Target

      Systeminteracts (32 bit).exe

    • Size

      37KB

    • MD5

      fb3f9f675ace4b0e2e3938b40b4a016e

    • SHA1

      e45bd61c9830bbdaa413f1e5addf2e05c9ccfd6e

    • SHA256

      d2673072e29073998e65da0023a0f4f6d96493ecdfbfee84b044b1947eef11d5

    • SHA512

      ebd2ff3940962155c9ee78dced5a2a2967f81084707e111a47af7fc60109996f4c87ab962c3deac1336464677b99cb48ea3ef76315cedcfd68232678439505f9

    • SSDEEP

      384:ISAjrUiS6L1G5k2gyk/8If5e/QUZSiKrAF+rMRTyN/0L+EcoinblneHQM3epzXr6:sjz32bk/8IQYUZStrM+rMRa8Nutqt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks