General

  • Target

    #1763541093.zip

  • Size

    503KB

  • Sample

    220121-18malsbhdj

  • MD5

    cb150c9ff3aaec6cf953c3ee6d39efac

  • SHA1

    c936b3beb13a9f7ca057fa568b9548dfb2268b30

  • SHA256

    8ca335734e64485bc7205310599635615cac9d91ecf4492189e90ad07cd75184

  • SHA512

    3ad2f24c50d505fcfdd656e28e6c76a822f3365315f916b0c382242076b051b4de473facffcdba682932e8d89e5881620522c834bc40b032031b6ffee2d03e69

Malware Config

Extracted

Family

njrat

Version

1.9

Botnet

HacKed

Mutex

Microsoft.Exe

Attributes
  • reg_key

    Microsoft.Exe

Targets

    • Target

      #1763541093.exe

    • Size

      300.0MB

    • MD5

      c8b67047772884a1bbca4b84cce30dac

    • SHA1

      e55b2a5bffa0c72196f0cb5334436a93362ed419

    • SHA256

      aba07cd1475a52821471edf1d361ffc6ee2a5ea13f8ef4eb7b0bd052f1b92c44

    • SHA512

      98f7e29d0c92545ca579276488dd2ec473a3cdc1024c2313bc0f25118a4682fb2d02c4ea7ea230e8c952a04d2cd4bbc3d5d4660933539786dbcff0529aa9ff95

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks