General

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/ngrok.yml

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/111.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/222.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/x.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/WindowsUpdate.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/ngrok.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/auto-install-hrdp.bat

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/hrdp/hrdp.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/hrdp/update.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://152.89.239.119/hrdp/autoupdate.zip

Extracted

Family

njrat

Version

0.7d

Botnet

حوالات

C2

*jYyNjI2LmRkbn*ubmV0:5552

Mutex

4e0c23218aae421528d2445f98e0e933

Attributes
  • reg_key

    4e0c23218aae421528d2445f98e0e933

  • splitter

    |'|'|

Extracted

Family

quasar

Version

1.4.0.0

Botnet

srlhost

C2

262626.ddns.net:5551

45.61.151.50:5551

Mutex

qVw3t6gtOwrpZYozK1

Attributes
  • encryption_key

    QfzNbeLbOitDzJWlP0jo

  • install_name

    spoolar.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    spooler

  • subdirectory

    printer

Targets

    • Modifies Windows Defender Real-time Protection settings

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Server Software Component: Terminal Services DLL

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

MITRE ATT&CK Enterprise v15

Tasks