General

  • Target

    8bc16349fad1dd201cf7929eb7ae7fce.exe

  • Size

    1.1MB

  • Sample

    210904-yvebqsedh7

  • MD5

    8bc16349fad1dd201cf7929eb7ae7fce

  • SHA1

    8a4eeb9c27e09c9e970f63731f9137013ad83c19

  • SHA256

    c8ad2a5b3da748a73f4ba9497f5d7674735f93716b9454fea5db13c7d5d0ee68

  • SHA512

    b7fba6f2c4694ff7c48c3b136c37a3f456e1bcf9a5aeb32fcd3eb9b51dcfe2f8ab1c2d0242a6ce0e1f7c75c9fa45d11c6a36ea46cc91e56fcabfa4e966f9f5c3

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

TAX_MON_30_08

C2

37.120.141.158:18892

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      8bc16349fad1dd201cf7929eb7ae7fce.exe

    • Size

      1.1MB

    • MD5

      8bc16349fad1dd201cf7929eb7ae7fce

    • SHA1

      8a4eeb9c27e09c9e970f63731f9137013ad83c19

    • SHA256

      c8ad2a5b3da748a73f4ba9497f5d7674735f93716b9454fea5db13c7d5d0ee68

    • SHA512

      b7fba6f2c4694ff7c48c3b136c37a3f456e1bcf9a5aeb32fcd3eb9b51dcfe2f8ab1c2d0242a6ce0e1f7c75c9fa45d11c6a36ea46cc91e56fcabfa4e966f9f5c3

    • Windows security bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Discovery

System Information Discovery

1
T1082

Tasks