General

  • Target

    b9c6c9838b6c8f0ee4142de9a4a15d79

  • Size

    31KB

  • Sample

    201214-zd126kvyq6

  • MD5

    b9c6c9838b6c8f0ee4142de9a4a15d79

  • SHA1

    0b8facf9ac1e2c02f2cc719019e8f19225d25447

  • SHA256

    3f9c4d9047bbdb5f2c575c11c9b7d43e94a8053ec7a03318ce82fcac84d74b14

  • SHA512

    9aed75440268b61717356c9fec17022d5a08badc73036100b17437c2d959cc4fbd76cd13b1316c79a09c46a877939da40f1d0611fa6fa6915495eb0ae228fe0b

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

SQLi Dumper

C2

osbios.net:3129

Mutex

b3bb675697aae6a94367e8803b763fc4

Attributes
  • reg_key

    b3bb675697aae6a94367e8803b763fc4

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      b9c6c9838b6c8f0ee4142de9a4a15d79

    • Size

      31KB

    • MD5

      b9c6c9838b6c8f0ee4142de9a4a15d79

    • SHA1

      0b8facf9ac1e2c02f2cc719019e8f19225d25447

    • SHA256

      3f9c4d9047bbdb5f2c575c11c9b7d43e94a8053ec7a03318ce82fcac84d74b14

    • SHA512

      9aed75440268b61717356c9fec17022d5a08badc73036100b17437c2d959cc4fbd76cd13b1316c79a09c46a877939da40f1d0611fa6fa6915495eb0ae228fe0b

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks