General

  • Target

    32B067ACA0339443A8CC7BE1A9398619.exe

  • Size

    245KB

  • Sample

    210904-r5a9haecd8

  • MD5

    32b067aca0339443a8cc7be1a9398619

  • SHA1

    8a2fecd5f8e83366528d6d30c1ed515b68f515b1

  • SHA256

    7e6dbe74cacc0af41a546d4c6de9a50a14556dd9aa1eb604f2f5b1b8aa947429

  • SHA512

    d43b9c7972d73ac093926cb966af6c798d43721298e6f4191d87a3918c03b9ecf3495f14e75aeff41a4bcf55ff1c5e65efbcf6e5691f803bb509efb461b6ae8d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

testvictim

C2

77.247.127.72:189

Mutex

0a04621658b925eb76dce3df766c44fe

Attributes
  • reg_key

    0a04621658b925eb76dce3df766c44fe

  • splitter

    |'|'|

Targets

    • Target

      32B067ACA0339443A8CC7BE1A9398619.exe

    • Size

      245KB

    • MD5

      32b067aca0339443a8cc7be1a9398619

    • SHA1

      8a2fecd5f8e83366528d6d30c1ed515b68f515b1

    • SHA256

      7e6dbe74cacc0af41a546d4c6de9a50a14556dd9aa1eb604f2f5b1b8aa947429

    • SHA512

      d43b9c7972d73ac093926cb966af6c798d43721298e6f4191d87a3918c03b9ecf3495f14e75aeff41a4bcf55ff1c5e65efbcf6e5691f803bb509efb461b6ae8d

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks