Resubmissions

25-01-2022 09:50

220125-ltxepsdee4 10

General

  • Target

    njRAT.exe

  • Size

    959KB

  • Sample

    220125-ltxepsdee4

  • MD5

    0431311b5f024d6e66b90d59491f2563

  • SHA1

    e9ff4da7e3f2199cbc16d37d8935cb1b0567ac2a

  • SHA256

    fd624aa205517580e83fad7a4ce4d64863e95f62b34ac72647b1974a52822199

  • SHA512

    d44b14e4b24e6e2d506ec32098488a16ebd5df57499ecd85e8878b8af2a3e1f9ed20d4125836417b702d0571f992aeac07af051dbf9268f48954556d17f51ee2

Malware Config

Targets

    • Target

      njRAT.exe

    • Size

      959KB

    • MD5

      0431311b5f024d6e66b90d59491f2563

    • SHA1

      e9ff4da7e3f2199cbc16d37d8935cb1b0567ac2a

    • SHA256

      fd624aa205517580e83fad7a4ce4d64863e95f62b34ac72647b1974a52822199

    • SHA512

      d44b14e4b24e6e2d506ec32098488a16ebd5df57499ecd85e8878b8af2a3e1f9ed20d4125836417b702d0571f992aeac07af051dbf9268f48954556d17f51ee2

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks