Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-10-2024 20:51

General

  • Target

    BootstrapperV.1.18.exe

  • Size

    55KB

  • MD5

    3bba97d678905285e7aca9e994d2b8db

  • SHA1

    6b6b2919de14e81df87ca77bd07587e1f22ddf4d

  • SHA256

    d336304b2781482a95350fe68bcbb594b53b9f08e8c2d13c8f49950b2fa8a2e0

  • SHA512

    7222e6a6c502aaf6b8793eb8dbd4b44442dbc192038205f587e874724acd2beae4558d05a1846d49682e925f20a1ab88a7fdd4e2484ff8bad67b52dbbf136ae6

  • SSDEEP

    1536:6GLu8DnN8N1+S1Cl/BODtwsNMDqXExI3pmpm:08DnNGcXODtwsNMDqXExI3pm

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperV.1.18.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperV.1.18.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4016-0-0x00000000735F1000-0x00000000735F2000-memory.dmp

    Filesize

    4KB

  • memory/4016-1-0x00000000735F0000-0x0000000073BA0000-memory.dmp

    Filesize

    5.7MB

  • memory/4016-2-0x00000000735F0000-0x0000000073BA0000-memory.dmp

    Filesize

    5.7MB

  • memory/4016-3-0x00000000735F0000-0x0000000073BA0000-memory.dmp

    Filesize

    5.7MB

  • memory/4016-4-0x00000000735F0000-0x0000000073BA0000-memory.dmp

    Filesize

    5.7MB