General

  • Target

    1ca2fa1eacf168c97e2663f7bbbe64afe6569ade725ed84f4ee1fe91aa27e83f

  • Size

    152KB

  • Sample

    210924-gx7mmagaej

  • MD5

    c2b9c99086b64ed5ef6ae1bd34288013

  • SHA1

    43a4fdff438bb03812aaf9cf273c5021a21623f8

  • SHA256

    1ca2fa1eacf168c97e2663f7bbbe64afe6569ade725ed84f4ee1fe91aa27e83f

  • SHA512

    7e2595d992653ba5b332514379ab2ea8aca86eefbe6c89f3970a3ea5c36f1922d88dda3341f269a5754fd4b87e0a3ed9eca1a79b6ee16c8482741401d0087391

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

daddygvgv.ddns.net:1177

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      1ca2fa1eacf168c97e2663f7bbbe64afe6569ade725ed84f4ee1fe91aa27e83f

    • Size

      152KB

    • MD5

      c2b9c99086b64ed5ef6ae1bd34288013

    • SHA1

      43a4fdff438bb03812aaf9cf273c5021a21623f8

    • SHA256

      1ca2fa1eacf168c97e2663f7bbbe64afe6569ade725ed84f4ee1fe91aa27e83f

    • SHA512

      7e2595d992653ba5b332514379ab2ea8aca86eefbe6c89f3970a3ea5c36f1922d88dda3341f269a5754fd4b87e0a3ed9eca1a79b6ee16c8482741401d0087391

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks