General

  • Target

    ZAgNhZBG.exe

  • Size

    23KB

  • Sample

    201221-dp5bj79tvx

  • MD5

    5859e656d5735eb9a1eeae9a94a3cc16

  • SHA1

    85c1ab9c6fe450a83fb2cc1681b45272020ce5a6

  • SHA256

    4c91e5ce3dc54a407d6fce46eede37d2e2343f4db688e158e23abb543ce5a350

  • SHA512

    8cce673a45d5aa0fde559311466f318a645a47be5da350e6743cc291b88ad0a90c805d0b0185940f34e192fa7011e731157aca0b82627f17e02e227f498f0c68

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

xoruf.ddns.net:5552

Mutex

d8f3c9bf39e889408d972a936cea46cc

Attributes
  • reg_key

    d8f3c9bf39e889408d972a936cea46cc

  • splitter

    @!#&^%$

Targets

    • Target

      ZAgNhZBG.exe

    • Size

      23KB

    • MD5

      5859e656d5735eb9a1eeae9a94a3cc16

    • SHA1

      85c1ab9c6fe450a83fb2cc1681b45272020ce5a6

    • SHA256

      4c91e5ce3dc54a407d6fce46eede37d2e2343f4db688e158e23abb543ce5a350

    • SHA512

      8cce673a45d5aa0fde559311466f318a645a47be5da350e6743cc291b88ad0a90c805d0b0185940f34e192fa7011e731157aca0b82627f17e02e227f498f0c68

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks