General

  • Target

    a73c12e9bb944ca7494ac845ee87db2e.exe

  • Size

    92KB

  • Sample

    211101-m1ptwahfg7

  • MD5

    a73c12e9bb944ca7494ac845ee87db2e

  • SHA1

    20ea37ae6b6b6cf15edc65bf200cde2a2b47d2a2

  • SHA256

    0e24d40828ef4582c2571e175e9f1c59e1484fa926cffe18b1a4547f6ee2781a

  • SHA512

    c89e78e08f97f6399d92a71efb489d998b2089bae74f26555f569e21440561fea64956370d8b881e3c8729f20ddc466c6821f5529cbc3a205b0700ba93f47bd5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

203.159.92.167:2323

Mutex

9d38b66479584d90a4d378a84f8e5769

Attributes
  • reg_key

    9d38b66479584d90a4d378a84f8e5769

  • splitter

    |'|'|

Targets

    • Target

      a73c12e9bb944ca7494ac845ee87db2e.exe

    • Size

      92KB

    • MD5

      a73c12e9bb944ca7494ac845ee87db2e

    • SHA1

      20ea37ae6b6b6cf15edc65bf200cde2a2b47d2a2

    • SHA256

      0e24d40828ef4582c2571e175e9f1c59e1484fa926cffe18b1a4547f6ee2781a

    • SHA512

      c89e78e08f97f6399d92a71efb489d998b2089bae74f26555f569e21440561fea64956370d8b881e3c8729f20ddc466c6821f5529cbc3a205b0700ba93f47bd5

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks