General

  • Target

    #461432638.exe

  • Size

    979KB

  • Sample

    220121-vxkdzsade2

  • MD5

    29bf474d20e0b17a36577c6e903e8afb

  • SHA1

    11cf027edff4d91c634b23972c612a9998b7173f

  • SHA256

    9ba526eaa176389b20e270129a403934a9625fdee27f1ad36ed20289f178421c

  • SHA512

    bab8419ec4c686e01f173ee23a21c4345c8e2f0cf1bd32d7302993b0cdc513b897563f7bb14b589b7920aedec4c027d74fa8924c72a11c83884ddc5b74484cb4

Malware Config

Extracted

Family

njrat

Version

1.9

Botnet

HacKed

Mutex

Microsoft.Exe

Attributes
  • reg_key

    Microsoft.Exe

Targets

    • Target

      #461432638.exe

    • Size

      979KB

    • MD5

      29bf474d20e0b17a36577c6e903e8afb

    • SHA1

      11cf027edff4d91c634b23972c612a9998b7173f

    • SHA256

      9ba526eaa176389b20e270129a403934a9625fdee27f1ad36ed20289f178421c

    • SHA512

      bab8419ec4c686e01f173ee23a21c4345c8e2f0cf1bd32d7302993b0cdc513b897563f7bb14b589b7920aedec4c027d74fa8924c72a11c83884ddc5b74484cb4

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks