General

  • Target

    sD4Q5TaU.exe

  • Size

    23KB

  • Sample

    210102-h8g62r7xdn

  • MD5

    c6666ce354062eaa6b64b7e67daa2968

  • SHA1

    40982aa18aa268abf9d61e544563841ff86cbf38

  • SHA256

    0cd1428ac5c9ef16fdc50458faac098457e93027f54eb011d04b74b944f67f67

  • SHA512

    b4cc5a6aa3f56b71bce993ab78ce82eaffd4aa40347672d0a019a1ea40e72bcdba2fedf79a8ee750e9de1c5452f8a6f429c4a2f186075c7710df8e5d1f98eb70

Malware Config

Extracted

Family

njrat

Version

Blue

Botnet

AntiBot

C2

anti.kro.kr:7

Mutex

bd8a83ed8b02d3c995a02f159f9c2953

Attributes
  • reg_key

    bd8a83ed8b02d3c995a02f159f9c2953

  • splitter

    |'|'|

Targets

    • Target

      sD4Q5TaU.exe

    • Size

      23KB

    • MD5

      c6666ce354062eaa6b64b7e67daa2968

    • SHA1

      40982aa18aa268abf9d61e544563841ff86cbf38

    • SHA256

      0cd1428ac5c9ef16fdc50458faac098457e93027f54eb011d04b74b944f67f67

    • SHA512

      b4cc5a6aa3f56b71bce993ab78ce82eaffd4aa40347672d0a019a1ea40e72bcdba2fedf79a8ee750e9de1c5452f8a6f429c4a2f186075c7710df8e5d1f98eb70

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks