General

  • Target

    tmp/42b65022-e76e-41d7-94f1-6dd7b719243c_server.exe

  • Size

    22KB

  • Sample

    211215-22nersage9

  • MD5

    c53d13780336aefe9b4318b19eba09a0

  • SHA1

    90682596f5da8e19c88f77d74a569d8da8521cfa

  • SHA256

    8774a2f15efbfc88e6a7c1831074909d1fbddbe895f2d900b111ccce16178c03

  • SHA512

    9a7249c1d5e33add5b0d84dee20e5641789d202f774e77e3a902271550e88f35f2a7d0f70a151a46908d87d91e19641296e6e4ec94d5ba52aec65ef73a3c4c83

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

test

C2

127.0.0.1:1443

Mutex

74cc423dce7f45f8f93124254b62aa00

Attributes
  • reg_key

    74cc423dce7f45f8f93124254b62aa00

  • splitter

    |'|'|

Targets

    • Target

      tmp/42b65022-e76e-41d7-94f1-6dd7b719243c_server.exe

    • Size

      22KB

    • MD5

      c53d13780336aefe9b4318b19eba09a0

    • SHA1

      90682596f5da8e19c88f77d74a569d8da8521cfa

    • SHA256

      8774a2f15efbfc88e6a7c1831074909d1fbddbe895f2d900b111ccce16178c03

    • SHA512

      9a7249c1d5e33add5b0d84dee20e5641789d202f774e77e3a902271550e88f35f2a7d0f70a151a46908d87d91e19641296e6e4ec94d5ba52aec65ef73a3c4c83

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks