General

  • Target

    a4b89da90c002a6cb2753c9eaa2655de.exe

  • Size

    31KB

  • Sample

    210513-rscgxpkc1s

  • MD5

    a4b89da90c002a6cb2753c9eaa2655de

  • SHA1

    11e80ffcc3bb1d9711aa46a6c0b9d21567a3e44a

  • SHA256

    917ef72731455e80e3d49b198924d5810e539984bb6c6dbd238d518ed284d8c5

  • SHA512

    421e0dd6660aeed60c6a5eea58bf5c4cfd6cebbdc4d9abca2d8a335bf3ba68afe7121eef45dec7a5bd46354a19cc815eb562337833e460c027c08e85887764dd

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

4.tcp.ngrok.io:12601

Mutex

ff9559ce9f577731b47f4f094b63f540

Attributes
  • reg_key

    ff9559ce9f577731b47f4f094b63f540

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      a4b89da90c002a6cb2753c9eaa2655de.exe

    • Size

      31KB

    • MD5

      a4b89da90c002a6cb2753c9eaa2655de

    • SHA1

      11e80ffcc3bb1d9711aa46a6c0b9d21567a3e44a

    • SHA256

      917ef72731455e80e3d49b198924d5810e539984bb6c6dbd238d518ed284d8c5

    • SHA512

      421e0dd6660aeed60c6a5eea58bf5c4cfd6cebbdc4d9abca2d8a335bf3ba68afe7121eef45dec7a5bd46354a19cc815eb562337833e460c027c08e85887764dd

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

System Information Discovery

1
T1082

Tasks