General

  • Target

    b28f74c18bf85bea722d915ee65f5f1c.exe

  • Size

    7.2MB

  • Sample

    211222-md8y8sfcb7

  • MD5

    b28f74c18bf85bea722d915ee65f5f1c

  • SHA1

    fff14f1641964aa645eb79d8e85786b6bbc42664

  • SHA256

    6b6c079401e47ab7c10a16fec31f9e330b3730f0e9f925caa43368b95a421b5e

  • SHA512

    3b1eaa9ed38fd4498d92b66f048509be96376bbd1384c3bfa2471786ff395a95c87b64d6b6e730c91a56ac1afd1ba76bba01d4f30470e426f972e702be881825

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

user

C2

6.tcp.ngrok.io:18635

Mutex

f1772f647278bebfd846fd1a1dc56683

Attributes
  • reg_key

    f1772f647278bebfd846fd1a1dc56683

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      b28f74c18bf85bea722d915ee65f5f1c.exe

    • Size

      7.2MB

    • MD5

      b28f74c18bf85bea722d915ee65f5f1c

    • SHA1

      fff14f1641964aa645eb79d8e85786b6bbc42664

    • SHA256

      6b6c079401e47ab7c10a16fec31f9e330b3730f0e9f925caa43368b95a421b5e

    • SHA512

      3b1eaa9ed38fd4498d92b66f048509be96376bbd1384c3bfa2471786ff395a95c87b64d6b6e730c91a56ac1afd1ba76bba01d4f30470e426f972e702be881825

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Tasks