General

  • Target

    3daf792075ad0eeacae676b0d7f80a68.exe

  • Size

    31KB

  • Sample

    210508-vkt9nn4jls

  • MD5

    3daf792075ad0eeacae676b0d7f80a68

  • SHA1

    7b2da0cac13461f09bfba7fad96253e517098ce7

  • SHA256

    cd6e990e83a947ee95fc38e33ef891fcd2adca0c669eba160cca49895471663a

  • SHA512

    da79cfb46e336d052353311cb0fb8a2b151c3f390dfe37dff008d6a8f3dcb09ceaa6c98a3d3c7174aefb0a900a77767c03cbc8742465b9cc75fd8e2847064bff

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

6.tcp.ngrok.io:12336

Mutex

442e245fdc9bd3433e2f89240f0d3737

Attributes
  • reg_key

    442e245fdc9bd3433e2f89240f0d3737

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      3daf792075ad0eeacae676b0d7f80a68.exe

    • Size

      31KB

    • MD5

      3daf792075ad0eeacae676b0d7f80a68

    • SHA1

      7b2da0cac13461f09bfba7fad96253e517098ce7

    • SHA256

      cd6e990e83a947ee95fc38e33ef891fcd2adca0c669eba160cca49895471663a

    • SHA512

      da79cfb46e336d052353311cb0fb8a2b151c3f390dfe37dff008d6a8f3dcb09ceaa6c98a3d3c7174aefb0a900a77767c03cbc8742465b9cc75fd8e2847064bff

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

System Information Discovery

1
T1082

Tasks