General

  • Target

    acc5c7bf3d24c6156b7defab87f564f5.exe

  • Size

    23KB

  • Sample

    211210-14hfvsaba7

  • MD5

    acc5c7bf3d24c6156b7defab87f564f5

  • SHA1

    53abe0aa5938faed0fd1eec79e8ebe84be0be570

  • SHA256

    fcdcfc11a385aaae03e3f31964503798eaa76a1ba726d17cb59ab440e155a5f6

  • SHA512

    6c43825a7b6e118f0c71dd12d3693ed4c0e929a34cefbb0f4e2aa6e98cedf1d612495345e5da4bf68068342a41f66244dcb6c2d8d07958255dc94aff018613b6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

6.tcp.ngrok.io:14833

Mutex

c6f306bc6c878b6dcab17d402884bb5d

Attributes
  • reg_key

    c6f306bc6c878b6dcab17d402884bb5d

  • splitter

    |'|'|

Targets

    • Target

      acc5c7bf3d24c6156b7defab87f564f5.exe

    • Size

      23KB

    • MD5

      acc5c7bf3d24c6156b7defab87f564f5

    • SHA1

      53abe0aa5938faed0fd1eec79e8ebe84be0be570

    • SHA256

      fcdcfc11a385aaae03e3f31964503798eaa76a1ba726d17cb59ab440e155a5f6

    • SHA512

      6c43825a7b6e118f0c71dd12d3693ed4c0e929a34cefbb0f4e2aa6e98cedf1d612495345e5da4bf68068342a41f66244dcb6c2d8d07958255dc94aff018613b6

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks