General

  • Target

    834e38185fb19b1adf58cc82aaf73e1e.exe

  • Size

    399KB

  • Sample

    211025-jcdvxsfgd5

  • MD5

    834e38185fb19b1adf58cc82aaf73e1e

  • SHA1

    2a3bca9b936093f82a1be92737012e683a863a6a

  • SHA256

    8a2e1a0ade05db6ef7fdc307b058119e7d84c26b7a75495a4348e310d67f15e7

  • SHA512

    4fe755a20fcbf6ac5c1f4993489a9c00306908f4497d11d1d260aad6bf26dbb7cd7b86e14d0d15f2546267df8cd19b2765405a1ee446d8bd316aa11201f1e7c9

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

------(Send)------

C2

new.libya2020.com.ly:2020

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      834e38185fb19b1adf58cc82aaf73e1e.exe

    • Size

      399KB

    • MD5

      834e38185fb19b1adf58cc82aaf73e1e

    • SHA1

      2a3bca9b936093f82a1be92737012e683a863a6a

    • SHA256

      8a2e1a0ade05db6ef7fdc307b058119e7d84c26b7a75495a4348e310d67f15e7

    • SHA512

      4fe755a20fcbf6ac5c1f4993489a9c00306908f4497d11d1d260aad6bf26dbb7cd7b86e14d0d15f2546267df8cd19b2765405a1ee446d8bd316aa11201f1e7c9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks