General

  • Target

    ad0f6231d44f6d0e08379256a3f765c0.exe

  • Size

    432KB

  • Sample

    211022-xdjpfscac7

  • MD5

    ad0f6231d44f6d0e08379256a3f765c0

  • SHA1

    765c2ba3990b9c2a603a0012dfac8e34e39eda38

  • SHA256

    a665eae243d8d987de7378c95a9e7894d95b7ca6632e7455dcb9431870e67016

  • SHA512

    8bcf9c48c9137b897194cd757ff80153462ce2ad2f2d468ab70ba4479808f3a8bd99006d50a0802289de43092b7079286a86091674d0173325b50ad089309eb0

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

2021

C2

aqq.linkpc.net:999

Mutex

a1776750d898d3976ceabc94432acfb1

Attributes
  • reg_key

    a1776750d898d3976ceabc94432acfb1

  • splitter

    |'|'|

Targets

    • Target

      ad0f6231d44f6d0e08379256a3f765c0.exe

    • Size

      432KB

    • MD5

      ad0f6231d44f6d0e08379256a3f765c0

    • SHA1

      765c2ba3990b9c2a603a0012dfac8e34e39eda38

    • SHA256

      a665eae243d8d987de7378c95a9e7894d95b7ca6632e7455dcb9431870e67016

    • SHA512

      8bcf9c48c9137b897194cd757ff80153462ce2ad2f2d468ab70ba4479808f3a8bd99006d50a0802289de43092b7079286a86091674d0173325b50ad089309eb0

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks