General

  • Target

    4e22ffa927f142e6ff961d58d959d4fa249f8876f3c93cd13c4601d4a855de87

  • Size

    127KB

  • Sample

    210228-kj5x371e2s

  • MD5

    3e528be94841987018e2558b8b77e44c

  • SHA1

    dcaa10301df26263ad0b0b59499320b9853d80e2

  • SHA256

    4e22ffa927f142e6ff961d58d959d4fa249f8876f3c93cd13c4601d4a855de87

  • SHA512

    5559cbcb4b4ab37935b5bbcb9c614858a2a0d8730c6164305b978db2f64e02fdc30b47f6ec2d3664ceca31bcff6f1c5d6df6ffc83606a3f2e4b4fa0bd85cc577

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

PB

C2

pbblackoutservices.ddns.net:5552

Mutex

f2201c938c366568e6928b0e3eab557d

Attributes
  • reg_key

    f2201c938c366568e6928b0e3eab557d

  • splitter

    |'|'|

Targets

    • Target

      4e22ffa927f142e6ff961d58d959d4fa249f8876f3c93cd13c4601d4a855de87

    • Size

      127KB

    • MD5

      3e528be94841987018e2558b8b77e44c

    • SHA1

      dcaa10301df26263ad0b0b59499320b9853d80e2

    • SHA256

      4e22ffa927f142e6ff961d58d959d4fa249f8876f3c93cd13c4601d4a855de87

    • SHA512

      5559cbcb4b4ab37935b5bbcb9c614858a2a0d8730c6164305b978db2f64e02fdc30b47f6ec2d3664ceca31bcff6f1c5d6df6ffc83606a3f2e4b4fa0bd85cc577

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks