General

  • Target

    15613d4d6864d22409277e56eff01c2b04e83562dd70f3fee12c675621a5971c

  • Size

    51KB

  • Sample

    210929-j3ak7aedcm

  • MD5

    0a9af90d289135ef065a62a0dda8602f

  • SHA1

    12d4ecffca285a1aeb9eca710cca16c71f4231d1

  • SHA256

    15613d4d6864d22409277e56eff01c2b04e83562dd70f3fee12c675621a5971c

  • SHA512

    730ad58241099b2aadbea6f7a9c90235c849f934877a2fc7cd7f9ed12ac015dd5c830c296f68b0fcbd811a9757c560d05a971b41b53a55b5455e75a662032128

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jinn

C2

mouhamedjinn2.ddns.net:1177

Mutex

9174f01a6e44cbc9af1239d5bb1d7327

Attributes
  • reg_key

    9174f01a6e44cbc9af1239d5bb1d7327

  • splitter

    |'|'|

Targets

    • Target

      15613d4d6864d22409277e56eff01c2b04e83562dd70f3fee12c675621a5971c

    • Size

      51KB

    • MD5

      0a9af90d289135ef065a62a0dda8602f

    • SHA1

      12d4ecffca285a1aeb9eca710cca16c71f4231d1

    • SHA256

      15613d4d6864d22409277e56eff01c2b04e83562dd70f3fee12c675621a5971c

    • SHA512

      730ad58241099b2aadbea6f7a9c90235c849f934877a2fc7cd7f9ed12ac015dd5c830c296f68b0fcbd811a9757c560d05a971b41b53a55b5455e75a662032128

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks