General

  • Target

    A81N2M36C_INV0ICE_RECEIPT.exe

  • Size

    679KB

  • Sample

    220113-1eecxacfb9

  • MD5

    ba79aabe98bf01d3f35359a9332be48f

  • SHA1

    0dbca5bfa445fca16f31bddfe3be23b1a41a80c0

  • SHA256

    0a9d287a3539c979a8c215ca003ca35293c324644e2f2c4dc3a38b4c7f9fa143

  • SHA512

    ad16e94537e80d6a185c6be021eb3b459e204fcc424366d89b222849f60ba00478335a036e66c197609f9a77161b093f7240c7ef1d699ff842fd9289d6e828d3

Malware Config

Extracted

Family

njrat

Version

1.9

Botnet

HacKed

Mutex

Microsoft.Exe

Attributes
  • reg_key

    Microsoft.Exe

Targets

    • Target

      A81N2M36C_INV0ICE_RECEIPT.exe

    • Size

      679KB

    • MD5

      ba79aabe98bf01d3f35359a9332be48f

    • SHA1

      0dbca5bfa445fca16f31bddfe3be23b1a41a80c0

    • SHA256

      0a9d287a3539c979a8c215ca003ca35293c324644e2f2c4dc3a38b4c7f9fa143

    • SHA512

      ad16e94537e80d6a185c6be021eb3b459e204fcc424366d89b222849f60ba00478335a036e66c197609f9a77161b093f7240c7ef1d699ff842fd9289d6e828d3

    • Windows security bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Windows security modification

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks