General

  • Target

    7355d1a43f1d438e09eebff0c90211b0.exe

  • Size

    227KB

  • Sample

    211105-nxbcragggj

  • MD5

    7355d1a43f1d438e09eebff0c90211b0

  • SHA1

    4d6ca4321e87d5381ceeb1b60c300b7ab69ef30a

  • SHA256

    566e2f01abcfcd6c7b757449819a52e6956f31d389a1b4c6f9dfbf443a97874c

  • SHA512

    867b8beda9c79d09cd40267f254f3134a5a8837cd195c1324a938fa17e53521910f0cc3b038a4676ce84c87bd475778a1900ea80ed03850b3ac7f4141ecbef2e

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

DirectX

C2

20.79.249.125:1604

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      7355d1a43f1d438e09eebff0c90211b0.exe

    • Size

      227KB

    • MD5

      7355d1a43f1d438e09eebff0c90211b0

    • SHA1

      4d6ca4321e87d5381ceeb1b60c300b7ab69ef30a

    • SHA256

      566e2f01abcfcd6c7b757449819a52e6956f31d389a1b4c6f9dfbf443a97874c

    • SHA512

      867b8beda9c79d09cd40267f254f3134a5a8837cd195c1324a938fa17e53521910f0cc3b038a4676ce84c87bd475778a1900ea80ed03850b3ac7f4141ecbef2e

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • UAC bypass

    • Windows security bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Nirsoft

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

5
T1089

Bypass User Account Control

1
T1088

Discovery

System Information Discovery

2
T1082

Tasks