General

  • Target

    NocturneLoader.bin

  • Size

    607KB

  • Sample

    241008-lyrp1szflr

  • MD5

    4a5b7c6a9592dd295c6c23c6b17eae92

  • SHA1

    538654fa1a9453483ab2d051fad9dfe38cfa2b3e

  • SHA256

    4c3fad8ea837861fe54356ad6e7e40cce2fe305b9cb323f07d8802c93a440b70

  • SHA512

    47144a0eac75fb8a4653644441c8f3805e98cf82e681e89288603497ca44b2a43e1c3e794171113bd8744bc712cef31578f0e4f8e54ac029f9613531820ec248

  • SSDEEP

    12288:Cs13XpHNz+8cbkAklsOnb7Ev812q94GEwX/E+:b3XbzzculsObQva91DX8

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

984559f52d4087243e95e5ad9bb48e8d

Attributes
  • reg_key

    984559f52d4087243e95e5ad9bb48e8d

  • splitter

    |'|'|

Targets

    • Target

      NocturneLoader.bin

    • Size

      607KB

    • MD5

      4a5b7c6a9592dd295c6c23c6b17eae92

    • SHA1

      538654fa1a9453483ab2d051fad9dfe38cfa2b3e

    • SHA256

      4c3fad8ea837861fe54356ad6e7e40cce2fe305b9cb323f07d8802c93a440b70

    • SHA512

      47144a0eac75fb8a4653644441c8f3805e98cf82e681e89288603497ca44b2a43e1c3e794171113bd8744bc712cef31578f0e4f8e54ac029f9613531820ec248

    • SSDEEP

      12288:Cs13XpHNz+8cbkAklsOnb7Ev812q94GEwX/E+:b3XbzzculsObQva91DX8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks