General

  • Target

    Build.exe

  • Size

    303KB

  • Sample

    250216-se8mra1md1

  • MD5

    943f1a9d9d1004f015091cfaef192cfc

  • SHA1

    4c9bd077fd554a2204afe6167af557be5b4d6d98

  • SHA256

    cff17719df8ce62727f832362988829ffc575033ed3baffc32c80bc6781ab5a7

  • SHA512

    95b302b47cbcd8464768a71b23374c4bb4dbb593bfdd07f725f173724e040914ea50172c2545c0f51bd698aaf98150a4d0e9babf7acef3defb81ffa04074141e

  • SSDEEP

    6144:nW91vhKkCj65dFAiS6Gya/wJy4iyp8XMTqu+KBWMEVoldfda4V:WvvhXLyi8F/wyxORtsVo3fD

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

so-cells.gl.at.ply.gg:9008

Mutex

79c62821fd77ed668d0ed2a55c141bb5

Attributes
  • reg_key

    79c62821fd77ed668d0ed2a55c141bb5

  • splitter

    |'|'|

Extracted

Family

xworm

C2

global-bibliographic.gl.at.ply.gg:9002

Attributes
  • Install_directory

    %AppData%

  • install_file

    svhost.exe

  • telegram

    https://api.telegram.org/bot7081348414:AAEQqhREW9-Pc1-aeS5a2NxfTFybIlvMOhk/sendMessage?chat_id=6426180826

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1339322912536002621/cjxWA57MCZ9WLm3vYoHg8wnWFObRXMZVP6sbXKeSW43gVq_r2MVkefXJJqanTXSxTcE8

Targets

    • Target

      Build.exe

    • Size

      303KB

    • MD5

      943f1a9d9d1004f015091cfaef192cfc

    • SHA1

      4c9bd077fd554a2204afe6167af557be5b4d6d98

    • SHA256

      cff17719df8ce62727f832362988829ffc575033ed3baffc32c80bc6781ab5a7

    • SHA512

      95b302b47cbcd8464768a71b23374c4bb4dbb593bfdd07f725f173724e040914ea50172c2545c0f51bd698aaf98150a4d0e9babf7acef3defb81ffa04074141e

    • SSDEEP

      6144:nW91vhKkCj65dFAiS6Gya/wJy4iyp8XMTqu+KBWMEVoldfda4V:WvvhXLyi8F/wyxORtsVo3fD

    • Detect Umbral payload

    • Detect Xworm Payload

    • Njrat family

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks