Analysis

  • max time kernel
    117s
  • max time network
    111s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 06:53 UTC

General

  • Target

    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe

  • Size

    55KB

  • MD5

    563cfd7cc9c80650d3fc036b40cd5020

  • SHA1

    ad902fe07dd8e65b55b3dd99376fff44fe2d7faa

  • SHA256

    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7b

  • SHA512

    6d4a3d8d31fc199f76615a066a715dbbab5b185611c1a46843245a2ac069cfa35aed9aa7d41c46271f45a8b6febff2a8d8635ba24ef9cbea10aecc4f18d45496

  • SSDEEP

    1536:jGCoDns0NiiSx1YDtwsNMDsXExI3pmem:joDnwXTYDtwsNMDsXExI3pm

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    "C:\Users\Admin\AppData\Local\Temp\0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2212

Network

  • flag-us
    DNS
    gman1.ddns.net
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    Remote address:
    8.8.8.8:53
    Request
    gman1.ddns.net
    IN A
    Response
    gman1.ddns.net
    IN A
    41.102.20.40
  • flag-us
    DNS
    gman1.ddns.net
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    Remote address:
    8.8.8.8:53
    Request
    gman1.ddns.net
    IN A
    Response
    gman1.ddns.net
    IN A
    41.102.20.40
  • 41.102.20.40:5552
    gman1.ddns.net
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    152 B
    3
  • 41.102.20.40:5552
    gman1.ddns.net
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    152 B
    3
  • 41.102.20.40:5552
    gman1.ddns.net
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    152 B
    3
  • 41.102.20.40:5552
    gman1.ddns.net
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    152 B
    3
  • 41.102.20.40:5552
    gman1.ddns.net
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    152 B
    3
  • 8.8.8.8:53
    gman1.ddns.net
    dns
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    60 B
    76 B
    1
    1

    DNS Request

    gman1.ddns.net

    DNS Response

    41.102.20.40

  • 8.8.8.8:53
    gman1.ddns.net
    dns
    0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
    60 B
    76 B
    1
    1

    DNS Request

    gman1.ddns.net

    DNS Response

    41.102.20.40

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2212-0-0x0000000074B11000-0x0000000074B12000-memory.dmp

    Filesize

    4KB

  • memory/2212-2-0x0000000074B10000-0x00000000750BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2212-1-0x0000000074B10000-0x00000000750BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2212-3-0x0000000074B10000-0x00000000750BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2212-4-0x0000000074B10000-0x00000000750BB000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.