General

  • Target

    CF75D51EC31D817017D71DBE8DEF69D443E4ECCA131E7.exe

  • Size

    398KB

  • Sample

    210911-j3ly8aecfm

  • MD5

    61522f3e0ff5ffcd3b70af0969ce67ff

  • SHA1

    055acee75181881b27e6c489b85efc530ed2a145

  • SHA256

    cf75d51ec31d817017d71dbe8def69d443e4ecca131e70ca6252ebc455e065a2

  • SHA512

    650da92d3c10f8649253016c721a7c522b213342913c134303a843aedee51e10e77a6913a8fe707a26b895d606dd2d362a5eba14de25c5f90a5eee1f8f8defd8

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

hacktrojancy.ddns.net:1177

Mutex

d4edd1f042d4d9678bd0e6fffb41b44f

Attributes
  • reg_key

    d4edd1f042d4d9678bd0e6fffb41b44f

  • splitter

    |'|'|

Extracted

Family

njrat

Version

0.7d

Botnet

aaa

C2

0.tcp.ngrok.io:18926

Mutex

25cfdc389bb9a2acd67334f0453faa4c

Attributes
  • reg_key

    25cfdc389bb9a2acd67334f0453faa4c

  • splitter

    |'|'|

Targets

    • Target

      CF75D51EC31D817017D71DBE8DEF69D443E4ECCA131E7.exe

    • Size

      398KB

    • MD5

      61522f3e0ff5ffcd3b70af0969ce67ff

    • SHA1

      055acee75181881b27e6c489b85efc530ed2a145

    • SHA256

      cf75d51ec31d817017d71dbe8def69d443e4ecca131e70ca6252ebc455e065a2

    • SHA512

      650da92d3c10f8649253016c721a7c522b213342913c134303a843aedee51e10e77a6913a8fe707a26b895d606dd2d362a5eba14de25c5f90a5eee1f8f8defd8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks