General

  • Target

    FiveMHackV2.exe

  • Size

    26.2MB

  • Sample

    250119-tzgv7swkcv

  • MD5

    0a80c7be4e77b4b2f9e580c26a0b5d13

  • SHA1

    7525eaf2118d893c6a73fa5471f6adea4e75e164

  • SHA256

    8028313f8ccc23c6cb1b07927d5e3a5e5aff66f36f2ce67be49cb96372722d76

  • SHA512

    362cb3f5306cb978bc7d8e7240023c9f859a9907a07b03df4756ea48b02c0b68ddf751719b13027bd2447d9b2d1d598e210c744c4b4e1bcc11d9d17b783a1169

  • SSDEEP

    786432:SKP9F8JjEdm7SJtWqwkd7q+XlR43OnDgUd4Z+c:P7qEdm7SHWqwGxXX43cDgUd4ZV

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

147.185.221.25:12821

Mutex

4ce4232fc398063865fce10fcca4f582

Attributes
  • reg_key

    4ce4232fc398063865fce10fcca4f582

  • splitter

    Y262SUCZ4UJJ

Extracted

Family

latentbot

C2

nikomklkahba.zapto.org

Targets

    • Target

      FiveMHackV2.exe

    • Size

      26.2MB

    • MD5

      0a80c7be4e77b4b2f9e580c26a0b5d13

    • SHA1

      7525eaf2118d893c6a73fa5471f6adea4e75e164

    • SHA256

      8028313f8ccc23c6cb1b07927d5e3a5e5aff66f36f2ce67be49cb96372722d76

    • SHA512

      362cb3f5306cb978bc7d8e7240023c9f859a9907a07b03df4756ea48b02c0b68ddf751719b13027bd2447d9b2d1d598e210c744c4b4e1bcc11d9d17b783a1169

    • SSDEEP

      786432:SKP9F8JjEdm7SJtWqwkd7q+XlR43OnDgUd4Z+c:P7qEdm7SHWqwGxXX43cDgUd4ZV

    • Detected google phishing page

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks