General

  • Target

    a4f62c45af96eb8cd4ef13910fecc554.exe

  • Size

    36KB

  • Sample

    211224-a2c59acgcl

  • MD5

    a4f62c45af96eb8cd4ef13910fecc554

  • SHA1

    5a716099195dd8f9d8a87f343be936c6d684b492

  • SHA256

    1f7971e9d98d51e7a89cb3cc698ef9f4e0be8a31790c509f75993c1e61c159d9

  • SHA512

    dfd8404697c018cb95ab16776e02738445178568fed682a54e17cecd99d6f3865dc91b5747f3bdec0e15daf85aa73fbc38b7c50e41423f76721851e59a122bf9

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

bisbotbako.ddns.net:5553

Mutex

96a463b52a9ece171dc1adc4c650aa32

Attributes
  • reg_key

    96a463b52a9ece171dc1adc4c650aa32

  • splitter

    |'|'|

Targets

    • Target

      a4f62c45af96eb8cd4ef13910fecc554.exe

    • Size

      36KB

    • MD5

      a4f62c45af96eb8cd4ef13910fecc554

    • SHA1

      5a716099195dd8f9d8a87f343be936c6d684b492

    • SHA256

      1f7971e9d98d51e7a89cb3cc698ef9f4e0be8a31790c509f75993c1e61c159d9

    • SHA512

      dfd8404697c018cb95ab16776e02738445178568fed682a54e17cecd99d6f3865dc91b5747f3bdec0e15daf85aa73fbc38b7c50e41423f76721851e59a122bf9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

      suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

    • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)

      suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)

    • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)

      suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks