General

  • Target

    baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc

  • Size

    3.3MB

  • Sample

    210930-jzmfksghg9

  • MD5

    a72d3ef38b9b0d80d375ac97883f7470

  • SHA1

    2bc6af59a6790ad806863240cf64569e02809cc3

  • SHA256

    baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc

  • SHA512

    ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

Hook

C2

conqhook.ddns.net:6522

Mutex

System

Attributes
  • reg_key

    System

  • splitter

    |-F-|

Targets

    • Target

      baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc

    • Size

      3.3MB

    • MD5

      a72d3ef38b9b0d80d375ac97883f7470

    • SHA1

      2bc6af59a6790ad806863240cf64569e02809cc3

    • SHA256

      baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc

    • SHA512

      ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks