General

  • Target

    dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea

  • Size

    23KB

  • Sample

    220121-21wdzscbb7

  • MD5

    14c9d9e1c3f8fdb224f8877313958af5

  • SHA1

    5db785abbfffb9f687e2ccddabd6a837383f8c4b

  • SHA256

    dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea

  • SHA512

    70ae376ec36acf2d5b6bb4a3a039f5f7ef6bbdd911016c5843d582e36546bc87b98347227b58355e498bd8f183b03f3732daae9755fb9d5be6b8320ea2b30350

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

rootx.ddns.net:1993

Mutex

4eaa2408a505bc0920f44b7eb6a94ef3

Attributes
  • reg_key

    4eaa2408a505bc0920f44b7eb6a94ef3

  • splitter

    |'|'|

Targets

    • Target

      dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea

    • Size

      23KB

    • MD5

      14c9d9e1c3f8fdb224f8877313958af5

    • SHA1

      5db785abbfffb9f687e2ccddabd6a837383f8c4b

    • SHA256

      dd2e456d8c219c112ebf0d877da739ee9b56800e0e32280a2fdbea3781c8d5ea

    • SHA512

      70ae376ec36acf2d5b6bb4a3a039f5f7ef6bbdd911016c5843d582e36546bc87b98347227b58355e498bd8f183b03f3732daae9755fb9d5be6b8320ea2b30350

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks