General

  • Target

    c1545dbc06eb4bd3681801efd6a9c6a14f1312f1cf528f23d5b2a576fa148191

  • Size

    126KB

  • Sample

    210930-psxkvshga9

  • MD5

    9ed1a098f59de1901780c6eb187aeac8

  • SHA1

    0cd5d65e05043b349066c431bacf84302d96cd51

  • SHA256

    c1545dbc06eb4bd3681801efd6a9c6a14f1312f1cf528f23d5b2a576fa148191

  • SHA512

    44280abf5e1bb9964f53c2efdf71806cfa0223939f69b6e1c10d8eccbcfaf111a412d70f8c0dc175f9f2b0e34eadafac5307554155f1e52d2eebec44716b4083

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

@ WeSt - HaCkInG K.S.A @

C2

w187.ddns.net:22

Mutex

Intel HD Graphics Drivers for Windows(R)

Attributes
  • reg_key

    Intel HD Graphics Drivers for Windows(R)

  • splitter

    |-F-|

Targets

    • Target

      c1545dbc06eb4bd3681801efd6a9c6a14f1312f1cf528f23d5b2a576fa148191

    • Size

      126KB

    • MD5

      9ed1a098f59de1901780c6eb187aeac8

    • SHA1

      0cd5d65e05043b349066c431bacf84302d96cd51

    • SHA256

      c1545dbc06eb4bd3681801efd6a9c6a14f1312f1cf528f23d5b2a576fa148191

    • SHA512

      44280abf5e1bb9964f53c2efdf71806cfa0223939f69b6e1c10d8eccbcfaf111a412d70f8c0dc175f9f2b0e34eadafac5307554155f1e52d2eebec44716b4083

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks