General

  • Target

    220813897cb699771f7c2c353034a7b8415047747577ed44041714742f62886dN.exe

  • Size

    92KB

  • Sample

    241226-v9m1mstjbp

  • MD5

    d6f9fc682f7af8fa12a2619290a82eb0

  • SHA1

    a90edbbd437777bd4908a172e0990b5711e1cf23

  • SHA256

    220813897cb699771f7c2c353034a7b8415047747577ed44041714742f62886d

  • SHA512

    8c5b281f1361907764a313724180154f6e7c71e0d4123d07dc9f32c59919a52e435c208e334b5755cdf940ce93789858f2162932bc41f2a48977f214ec50f13a

  • SSDEEP

    1536:607nGfBulrp69O6+kp36hjQ58WCmB3cFwzvkc/:/nGfBulU9O6+kpVztlewzc

Malware Config

Extracted

Family

njrat

C2

hakim32.ddns.net:2000

Extracted

Family

latentbot

C2

testttt8745.zapto.org

Targets

    • Target

      220813897cb699771f7c2c353034a7b8415047747577ed44041714742f62886dN.exe

    • Size

      92KB

    • MD5

      d6f9fc682f7af8fa12a2619290a82eb0

    • SHA1

      a90edbbd437777bd4908a172e0990b5711e1cf23

    • SHA256

      220813897cb699771f7c2c353034a7b8415047747577ed44041714742f62886d

    • SHA512

      8c5b281f1361907764a313724180154f6e7c71e0d4123d07dc9f32c59919a52e435c208e334b5755cdf940ce93789858f2162932bc41f2a48977f214ec50f13a

    • SSDEEP

      1536:607nGfBulrp69O6+kp36hjQ58WCmB3cFwzvkc/:/nGfBulU9O6+kpVztlewzc

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks