General

  • Target

    botnet.exe

  • Size

    198KB

  • Sample

    250114-r7ckcasqhk

  • MD5

    3d257d086f0deb8f071750ecd2f0920d

  • SHA1

    aba1c55c9b4b6508b18731890fb53bb3a9c1ab0f

  • SHA256

    677dbc521d1d7babe3fc7676f20083ba4b712b910301bef2c0fd250a25fc6984

  • SHA512

    f3b191f46aa3b801618366a027a40a5b6df420eef2f875f295c7146666aa3d8bfbd01d5405d8b6e779a31e8e79530a91aa69028d6cf011163b97a9491894b74a

  • SSDEEP

    6144:PMhkGNbq9+R0asskirU+sHzSTWv42iRhuq5T25:kctZlirtWv42J

Malware Config

Targets

    • Target

      botnet.exe

    • Size

      198KB

    • MD5

      3d257d086f0deb8f071750ecd2f0920d

    • SHA1

      aba1c55c9b4b6508b18731890fb53bb3a9c1ab0f

    • SHA256

      677dbc521d1d7babe3fc7676f20083ba4b712b910301bef2c0fd250a25fc6984

    • SHA512

      f3b191f46aa3b801618366a027a40a5b6df420eef2f875f295c7146666aa3d8bfbd01d5405d8b6e779a31e8e79530a91aa69028d6cf011163b97a9491894b74a

    • SSDEEP

      6144:PMhkGNbq9+R0asskirU+sHzSTWv42iRhuq5T25:kctZlirtWv42J

    • Njrat family

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Stops running service(s)

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks