General

  • Target

    7f806c97ab68106ea238c1e5bc906388

  • Size

    8KB

  • Sample

    220114-trfceahbd4

  • MD5

    7f806c97ab68106ea238c1e5bc906388

  • SHA1

    571e34bda90b0194f6c7bc353e5c0c56a7143d38

  • SHA256

    b757bd1c8c93b75204ca653d5b602e98f1b3a174a1657f185dd4794fda4a2866

  • SHA512

    e1b998d4b1f3786d711bf647615787082fd907ca1c50c9731cb2eea843da85b33cc04ec1bf60b22693ced7acc392dd5c09f496b1cfcab3e2ed50c85a290d13c9

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Furios

C2

gghosting221.ddns.net:6202

Mutex

5f458dd5f03f50e31781ca69de125d55

Attributes
  • reg_key

    5f458dd5f03f50e31781ca69de125d55

  • splitter

    |'|'|

Targets

    • Target

      7f806c97ab68106ea238c1e5bc906388

    • Size

      8KB

    • MD5

      7f806c97ab68106ea238c1e5bc906388

    • SHA1

      571e34bda90b0194f6c7bc353e5c0c56a7143d38

    • SHA256

      b757bd1c8c93b75204ca653d5b602e98f1b3a174a1657f185dd4794fda4a2866

    • SHA512

      e1b998d4b1f3786d711bf647615787082fd907ca1c50c9731cb2eea843da85b33cc04ec1bf60b22693ced7acc392dd5c09f496b1cfcab3e2ed50c85a290d13c9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks