General

  • Target

    9DEDCFFA477C50EED62E213C99D750E678598AC9E0DD7.exe

  • Size

    37KB

  • Sample

    211117-z7xjhseae3

  • MD5

    150764abf9037c90cbe8408e1996662a

  • SHA1

    6b6b6b238542cd1de0d971ee88a0fa07663940f4

  • SHA256

    9dedcffa477c50eed62e213c99d750e678598ac9e0dd774e5892d25c58269b23

  • SHA512

    f4c9f1c36ebc88075ffa6befcbdcf41fc567347eadd1550e5555707d926071e6691827a7ad6edf5db71ec2a7925e957950d8faaa83e0cea868014a9bb1934959

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.ngrok.io:11771

Mutex

bb28dda136516948b0f50a690d5a161e

Attributes
  • reg_key

    bb28dda136516948b0f50a690d5a161e

  • splitter

    |'|'|

Targets

    • Target

      9DEDCFFA477C50EED62E213C99D750E678598AC9E0DD7.exe

    • Size

      37KB

    • MD5

      150764abf9037c90cbe8408e1996662a

    • SHA1

      6b6b6b238542cd1de0d971ee88a0fa07663940f4

    • SHA256

      9dedcffa477c50eed62e213c99d750e678598ac9e0dd774e5892d25c58269b23

    • SHA512

      f4c9f1c36ebc88075ffa6befcbdcf41fc567347eadd1550e5555707d926071e6691827a7ad6edf5db71ec2a7925e957950d8faaa83e0cea868014a9bb1934959

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks