General

  • Target

    Invoice #019972.vbs

  • Size

    2KB

  • Sample

    211018-ytvbkafecj

  • MD5

    ee3daa79d7ac4570d146aceb38253293

  • SHA1

    40b16db43a5c60e9f6a0ec49ab984698a3d1129b

  • SHA256

    1e00836862dc8fc7fd742e9df49a8b0d141b391139bfb1c5a23f20413eb6d639

  • SHA512

    6342d990ce3ea3ab94e2086cfda644d29bd5ea852da17f81b28b6d6a915ab0c31e9ea3580d302a43f277fdea68f1a8afe4be1c4343b89831b29f46b0bf1b70aa

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

CHEM

C2

petrol-chem108.duckdns.org:40225

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      Invoice #019972.vbs

    • Size

      2KB

    • MD5

      ee3daa79d7ac4570d146aceb38253293

    • SHA1

      40b16db43a5c60e9f6a0ec49ab984698a3d1129b

    • SHA256

      1e00836862dc8fc7fd742e9df49a8b0d141b391139bfb1c5a23f20413eb6d639

    • SHA512

      6342d990ce3ea3ab94e2086cfda644d29bd5ea852da17f81b28b6d6a915ab0c31e9ea3580d302a43f277fdea68f1a8afe4be1c4343b89831b29f46b0bf1b70aa

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks