General

  • Target

    c9bc2ade28395d0077523ecde62bf6ab

  • Size

    670KB

  • Sample

    220125-1wp6qsgdc2

  • MD5

    c9bc2ade28395d0077523ecde62bf6ab

  • SHA1

    aa815fa396dcc8549e5a1b39445b517c092acd72

  • SHA256

    6ab420972ed80355eeb88e3f08d4e9124141012b6a25e4f2ed6c19235da10d21

  • SHA512

    1aaca0dcc9974c14f2d724e3f507a86b4ccfe6b5932ceb9d0089774e32729f5ecb6e86f9742f803711f50aabf7e6f2d43c4ab2ce939abad2a553ac4699abac9e

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

24-ene

C2

googlemaintenanceservice.duckdns.org:7856

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    ultimate

Targets

    • Target

      c9bc2ade28395d0077523ecde62bf6ab

    • Size

      670KB

    • MD5

      c9bc2ade28395d0077523ecde62bf6ab

    • SHA1

      aa815fa396dcc8549e5a1b39445b517c092acd72

    • SHA256

      6ab420972ed80355eeb88e3f08d4e9124141012b6a25e4f2ed6c19235da10d21

    • SHA512

      1aaca0dcc9974c14f2d724e3f507a86b4ccfe6b5932ceb9d0089774e32729f5ecb6e86f9742f803711f50aabf7e6f2d43c4ab2ce939abad2a553ac4699abac9e

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks