General

  • Target

    3de70e8b308469f55fafddb2e107d3ae908005e1445eb5d1b09a7ff690f62c67

  • Size

    136KB

  • Sample

    210930-pseeaahga5

  • MD5

    359a08045b66fe5f71fde43f9a6db01b

  • SHA1

    4580e9f5becff35c4c4e773931d18f2df166d9fc

  • SHA256

    3de70e8b308469f55fafddb2e107d3ae908005e1445eb5d1b09a7ff690f62c67

  • SHA512

    81b120f81da9b442cb008093b54893d44dad911caffc1008c7de792e1420e1bedc15deb616f745e807410f47db3c049a316a77ffe42bef6959359f39af841683

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      3de70e8b308469f55fafddb2e107d3ae908005e1445eb5d1b09a7ff690f62c67

    • Size

      136KB

    • MD5

      359a08045b66fe5f71fde43f9a6db01b

    • SHA1

      4580e9f5becff35c4c4e773931d18f2df166d9fc

    • SHA256

      3de70e8b308469f55fafddb2e107d3ae908005e1445eb5d1b09a7ff690f62c67

    • SHA512

      81b120f81da9b442cb008093b54893d44dad911caffc1008c7de792e1420e1bedc15deb616f745e807410f47db3c049a316a77ffe42bef6959359f39af841683

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks