General

  • Target

    eab676d7c859d6c7073c4f02e2de14f0.exe

  • Size

    78KB

  • Sample

    210906-14ltaaegap

  • MD5

    eab676d7c859d6c7073c4f02e2de14f0

  • SHA1

    e520e72fdc62d891ffaaf19ab7cbc86d6ff327f1

  • SHA256

    55467019688a5c8760107c68ef5b62269ed2268cb376d6781c2db18fe1b4b777

  • SHA512

    d836f8dcc68cafd92f5ca0883b7d5073177f182104d44c8166a11aa0fcdc1f6072740cb04bd05030be039891b4eb960dbf365320a7535779fcedbe21012d328f

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

JUNIO30

C2

verde2020.duckdns.org:7782

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    1234

Targets

    • Target

      eab676d7c859d6c7073c4f02e2de14f0.exe

    • Size

      78KB

    • MD5

      eab676d7c859d6c7073c4f02e2de14f0

    • SHA1

      e520e72fdc62d891ffaaf19ab7cbc86d6ff327f1

    • SHA256

      55467019688a5c8760107c68ef5b62269ed2268cb376d6781c2db18fe1b4b777

    • SHA512

      d836f8dcc68cafd92f5ca0883b7d5073177f182104d44c8166a11aa0fcdc1f6072740cb04bd05030be039891b4eb960dbf365320a7535779fcedbe21012d328f

    Score
    10/10
    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Deletes itself

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Tasks