General

  • Target

    d7d409bba14e1deb37b6c589a6e21a85

  • Size

    23KB

  • Sample

    201214-75emtp68z2

  • MD5

    d7d409bba14e1deb37b6c589a6e21a85

  • SHA1

    77553fab55f20d963c193403e3d616af9e534423

  • SHA256

    4ba5a3bf2d29ffad2ac84dcf7b86adaf1918476f1ec28ee23c457a5fbfa13d5c

  • SHA512

    0cb65ce4c283334ba1c9bc3f5c390b8aee422369479da99f12e3ea54c90aa350128b2863e9a19c24017fffec1e6675d45aceeb5d4f2187212471a7e29a440702

Malware Config

Extracted

Family

njrat

Version

Madest 0.7d

Botnet

HacKed

C2

2.tcp.ngrok.io:19473

Mutex

604f175a359f0dc228c1d0efe969a277

Attributes
  • reg_key

    604f175a359f0dc228c1d0efe969a277

  • splitter

    |'|'|

Targets

    • Target

      d7d409bba14e1deb37b6c589a6e21a85

    • Size

      23KB

    • MD5

      d7d409bba14e1deb37b6c589a6e21a85

    • SHA1

      77553fab55f20d963c193403e3d616af9e534423

    • SHA256

      4ba5a3bf2d29ffad2ac84dcf7b86adaf1918476f1ec28ee23c457a5fbfa13d5c

    • SHA512

      0cb65ce4c283334ba1c9bc3f5c390b8aee422369479da99f12e3ea54c90aa350128b2863e9a19c24017fffec1e6675d45aceeb5d4f2187212471a7e29a440702

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks