General

  • Target

    b391dff3fa3c24f90d436a02dd0d2683.exe

  • Size

    37KB

  • Sample

    211211-ggv9naagf2

  • MD5

    b391dff3fa3c24f90d436a02dd0d2683

  • SHA1

    7e0fd1cd21941be2542ffb77d808b1dbd3c90566

  • SHA256

    8f0041ef66cd6262fb4a1b5c05ed0c0fe5b17322bbb8394efd65fcbb33adfae3

  • SHA512

    3a3d025d3f8eade79808c801dc98938843627dba6a6a9e794dc4b0990d86caaf4ec308d3b479712f049eb4be23097dc3c79d7719bc0b634b425889857edf9282

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.ngrok.io:16295

Mutex

59596196f8ae2919cd21fc46c7e7acf0

Attributes
  • reg_key

    59596196f8ae2919cd21fc46c7e7acf0

  • splitter

    |'|'|

Targets

    • Target

      b391dff3fa3c24f90d436a02dd0d2683.exe

    • Size

      37KB

    • MD5

      b391dff3fa3c24f90d436a02dd0d2683

    • SHA1

      7e0fd1cd21941be2542ffb77d808b1dbd3c90566

    • SHA256

      8f0041ef66cd6262fb4a1b5c05ed0c0fe5b17322bbb8394efd65fcbb33adfae3

    • SHA512

      3a3d025d3f8eade79808c801dc98938843627dba6a6a9e794dc4b0990d86caaf4ec308d3b479712f049eb4be23097dc3c79d7719bc0b634b425889857edf9282

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks