General

  • Target

    73ef8785ce221925db2e244da366959e541eed19f13fe85bb58892880381071c

  • Size

    125KB

  • Sample

    210930-psxkvshgb2

  • MD5

    0d2a094f6702c6723432871c12e35d79

  • SHA1

    993881a65653a92c938116dfca5fee60c6698c81

  • SHA256

    73ef8785ce221925db2e244da366959e541eed19f13fe85bb58892880381071c

  • SHA512

    94157f8f392746089fb0973c9cef857a902bf3157d85ef7e8cfe6845a60f2d9ede317b99d2ea922096083bc894fa5cacaf9c7c0af51685410251b83bfcd69d4b

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

@ WeSt - HaCkInG K.S.A @

C2

w187.ddns.net:22

Mutex

Intel HD Graphics Drivers for Windows(R)

Attributes
  • reg_key

    Intel HD Graphics Drivers for Windows(R)

  • splitter

    |-F-|

Targets

    • Target

      73ef8785ce221925db2e244da366959e541eed19f13fe85bb58892880381071c

    • Size

      125KB

    • MD5

      0d2a094f6702c6723432871c12e35d79

    • SHA1

      993881a65653a92c938116dfca5fee60c6698c81

    • SHA256

      73ef8785ce221925db2e244da366959e541eed19f13fe85bb58892880381071c

    • SHA512

      94157f8f392746089fb0973c9cef857a902bf3157d85ef7e8cfe6845a60f2d9ede317b99d2ea922096083bc894fa5cacaf9c7c0af51685410251b83bfcd69d4b

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks