General

  • Target

    277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2

  • Size

    1.2MB

  • Sample

    210228-y2xned61wx

  • MD5

    6382e1ba0bdcd1a586f97e1e20f77868

  • SHA1

    2cc4ae531be8b82dccf3c4c14e326307e2926658

  • SHA256

    277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2

  • SHA512

    c87b8082c6e4e58772fc189f64c64c89ced21cee1530dbf785e3e540163821f30fe9113671e5ddab3922468713f21c0a0784de869c2863ba362e09c9a1765ad3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HNZ-SHOP

C2

*TI3LjAu*C4x:5552

Mutex

316cc8fdf2ba11b55349f6a002cabe83

Attributes
  • reg_key

    316cc8fdf2ba11b55349f6a002cabe83

  • splitter

    |'|'|

Targets

    • Target

      277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2

    • Size

      1.2MB

    • MD5

      6382e1ba0bdcd1a586f97e1e20f77868

    • SHA1

      2cc4ae531be8b82dccf3c4c14e326307e2926658

    • SHA256

      277a2404fd4b34ba64813a529d1029bd7f1971b14a09df35e382ae639c3c28a2

    • SHA512

      c87b8082c6e4e58772fc189f64c64c89ced21cee1530dbf785e3e540163821f30fe9113671e5ddab3922468713f21c0a0784de869c2863ba362e09c9a1765ad3

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks