General

  • Target

    93abd5fd5684804d71380d38d29229c4.exe

  • Size

    93KB

  • Sample

    220111-jr5besfdbj

  • MD5

    93abd5fd5684804d71380d38d29229c4

  • SHA1

    37fc6c58c910d7ed3ad47d25698f52f5a8f7aeb9

  • SHA256

    13f740ded52b5779a1087e1d7a333b622ad3ed80a962e4211e76adf42cc0765b

  • SHA512

    036f32739370925d2362aa28aaf543b90e2facb7859b2ca0c46c59bcc749ec74f6823c70a20b50fd580a9ec77846c58a946ae933e404fc603b689d30bf095b0a

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

Ni50Y3Aubmdyb2suaW8Strik:MTk5MzA=

Mutex

8ed939d5d78ac3a222ff6581695b4837

Attributes
  • reg_key

    8ed939d5d78ac3a222ff6581695b4837

  • splitter

    |'|'|

Targets

    • Target

      93abd5fd5684804d71380d38d29229c4.exe

    • Size

      93KB

    • MD5

      93abd5fd5684804d71380d38d29229c4

    • SHA1

      37fc6c58c910d7ed3ad47d25698f52f5a8f7aeb9

    • SHA256

      13f740ded52b5779a1087e1d7a333b622ad3ed80a962e4211e76adf42cc0765b

    • SHA512

      036f32739370925d2362aa28aaf543b90e2facb7859b2ca0c46c59bcc749ec74f6823c70a20b50fd580a9ec77846c58a946ae933e404fc603b689d30bf095b0a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks