General

  • Target

    ea6e1e414c8447ceb06f18ffe15fa3c0a25c51549339abd708b4241ff8dd848e.zip

  • Size

    11KB

  • Sample

    211130-b3j6madbfr

  • MD5

    7712c1ee05658a3a526e4e8bc95c748c

  • SHA1

    768314e8f728b17e827f3afa76a62c069013a7bd

  • SHA256

    dc6f749e057f7d618633d16594f3713d8ca434fd9ecd4692dfa99cb5c2e96234

  • SHA512

    0b59165ebf75cd3cf43664e208cbf326fe7e5b2edf0f504f020aa5548aafc119f6d5948e8aa7dbf5eb6f43a54b57d3b6f0951e018c95007447f7322f8d1ad60a

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

172.20.10.5:5552

Mutex

ec10a8650967b67507124264e21a7053

Attributes
  • reg_key

    ec10a8650967b67507124264e21a7053

  • splitter

    |'|'|

Targets

    • Target

      ea6e1e414c8447ceb06f18ffe15fa3c0a25c51549339abd708b4241ff8dd848e

    • Size

      23KB

    • MD5

      4a9a55ab3ade85e8d79eb480b2792135

    • SHA1

      8731a76046282b645b3a106650cee02481f10bf0

    • SHA256

      ea6e1e414c8447ceb06f18ffe15fa3c0a25c51549339abd708b4241ff8dd848e

    • SHA512

      97b2990f012302bdfb33136791bac0f013cb702d91b4f31371b8f6020a907b0c1f580098e316c08e6e48ff1f3269bfe915431931e604b7ed4aaa0cb9c74c2cfc

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks