General

  • Target

    f3b94012_extracted

  • Size

    23KB

  • Sample

    210304-cryqftxrg2

  • MD5

    c7dbecf69ab308b7fd2c863f2d52fc03

  • SHA1

    8b61bd4e0c169dd50c5c84936f8d2d2b9b9ef2cb

  • SHA256

    eb7b4bb8bdbd8f176f035ffaa55c607595638cc289ceca5e4df9636a70f517e0

  • SHA512

    f06e545169903bf42886e9cc20a9e7b722a713460df64312de46bf35b29b5b1099f44f6f95b1f17c0e86dbe18705cfd2394abcda35e83672776a89cb08152751

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

$$$$$$Fucking

C2

whmfix009.cf:5409

Mutex

f6a7c83d337d940f548e06019597f0a2

Attributes
  • reg_key

    f6a7c83d337d940f548e06019597f0a2

  • splitter

    |'|'|

Targets

    • Target

      f3b94012_extracted

    • Size

      23KB

    • MD5

      c7dbecf69ab308b7fd2c863f2d52fc03

    • SHA1

      8b61bd4e0c169dd50c5c84936f8d2d2b9b9ef2cb

    • SHA256

      eb7b4bb8bdbd8f176f035ffaa55c607595638cc289ceca5e4df9636a70f517e0

    • SHA512

      f06e545169903bf42886e9cc20a9e7b722a713460df64312de46bf35b29b5b1099f44f6f95b1f17c0e86dbe18705cfd2394abcda35e83672776a89cb08152751

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks