General

  • Target

    38fdd127d155587e46643e9ce269951ab8f3c41563437613dc5709aeadfceb32N.exe

  • Size

    3.2MB

  • Sample

    241230-qg1zksyle1

  • MD5

    7b9480d4a112833514e7bb79434ac910

  • SHA1

    9050db3991eaa8a2ab8d0485877f54e096660036

  • SHA256

    38fdd127d155587e46643e9ce269951ab8f3c41563437613dc5709aeadfceb32

  • SHA512

    125e94039981aa6072a352dddcc531f58cdc3d9db9bb0557c3ba1561fcd40b7d0fea76b06701ec7e53248c4c0e6ac607c7d8e71dfde0a0221abff9eaa006b693

  • SSDEEP

    98304:ZtiwNlunVqirIBmG9Li2JWrV2yM0SlNevauUaO/tCI:Zt9unlrIBT9LVJoV2yM0SlNevwC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Owned

C2

hakim32.ddns.net:2000

167.71.56.116:22342

Mutex

24983f03fb74576bbc5af6aa1085b23d

Attributes
  • reg_key

    24983f03fb74576bbc5af6aa1085b23d

  • splitter

    |'|'|

Extracted

Family

quasar

Version

1.4.1

Botnet

Axotrojan

C2

eu-central-7075.packetriot.net:22342

167.71.56.116:22342

Mutex

34892381-1dda-4b06-87a2-3e413b932ac8

Attributes
  • encryption_key

    4B13DC71783277444E966E1D66F9171ABFC15E88

  • install_name

    Clientformyslut.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Axo startup

  • subdirectory

    SubDir

Targets

    • Target

      38fdd127d155587e46643e9ce269951ab8f3c41563437613dc5709aeadfceb32N.exe

    • Size

      3.2MB

    • MD5

      7b9480d4a112833514e7bb79434ac910

    • SHA1

      9050db3991eaa8a2ab8d0485877f54e096660036

    • SHA256

      38fdd127d155587e46643e9ce269951ab8f3c41563437613dc5709aeadfceb32

    • SHA512

      125e94039981aa6072a352dddcc531f58cdc3d9db9bb0557c3ba1561fcd40b7d0fea76b06701ec7e53248c4c0e6ac607c7d8e71dfde0a0221abff9eaa006b693

    • SSDEEP

      98304:ZtiwNlunVqirIBmG9Li2JWrV2yM0SlNevauUaO/tCI:Zt9unlrIBT9LVJoV2yM0SlNevwC

    • Njrat family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks