General

  • Target

    dffffd.exe

  • Size

    661KB

  • Sample

    210922-vm9acsdcc9

  • MD5

    75877c7f6a8b5a2642c5b3c389444394

  • SHA1

    9168024a9c3a28d5be15953eccaeb5bff68b9601

  • SHA256

    ef8c7077685d93118f27d7c334f60a440b31e127989748078057c5855c35aba9

  • SHA512

    e2cb7c74989493526c67cc569e9503be079693d8d65874f283889768db07160fe2bda293f9d045c87261948ddedb291c06ca9dcdae8c4cd81c0a51eb5748742e

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

Wed_22_GreenLife

C2

37.120.141.158:18892

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      dffffd.exe

    • Size

      661KB

    • MD5

      75877c7f6a8b5a2642c5b3c389444394

    • SHA1

      9168024a9c3a28d5be15953eccaeb5bff68b9601

    • SHA256

      ef8c7077685d93118f27d7c334f60a440b31e127989748078057c5855c35aba9

    • SHA512

      e2cb7c74989493526c67cc569e9503be079693d8d65874f283889768db07160fe2bda293f9d045c87261948ddedb291c06ca9dcdae8c4cd81c0a51eb5748742e

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks