General

  • Target

    c3ecb60634ee3e18fb05e1ebb99ceeb681719627c85eb5a5aa662242adb0b67f

  • Size

    125KB

  • Sample

    210930-qbc1kahhfj

  • MD5

    3fbf4474b23237150d9018329c00a1f1

  • SHA1

    182410f52162e2c65b3491adfdc80e2bdd05fe50

  • SHA256

    c3ecb60634ee3e18fb05e1ebb99ceeb681719627c85eb5a5aa662242adb0b67f

  • SHA512

    65293c7d99abdb7fc9539f9a1a1640ccfb0a11e06f9949639b7592de2445f6144652666fefd8eb2570207833df85041a754af85fd077e4f0a92b0b33a74ee907

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

@ WeSt - HaCkInG K.S.A @

C2

w187.ddns.net:22

Mutex

Intel HD Graphics Drivers for Windows(R)

Attributes
  • reg_key

    Intel HD Graphics Drivers for Windows(R)

  • splitter

    |-F-|

Targets

    • Target

      c3ecb60634ee3e18fb05e1ebb99ceeb681719627c85eb5a5aa662242adb0b67f

    • Size

      125KB

    • MD5

      3fbf4474b23237150d9018329c00a1f1

    • SHA1

      182410f52162e2c65b3491adfdc80e2bdd05fe50

    • SHA256

      c3ecb60634ee3e18fb05e1ebb99ceeb681719627c85eb5a5aa662242adb0b67f

    • SHA512

      65293c7d99abdb7fc9539f9a1a1640ccfb0a11e06f9949639b7592de2445f6144652666fefd8eb2570207833df85041a754af85fd077e4f0a92b0b33a74ee907

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks