General

  • Target

    8b191797f59eed06a02682638aef669c467eb1b0a205f4e525bd1ec0b1d13ddd

  • Size

    155KB

  • Sample

    220129-ft9r5sdhc3

  • MD5

    b5b82647f5478d76c7a6d03f56a4a5d4

  • SHA1

    adc613169ac58740eb92aa9e8bbd163f4c0079c0

  • SHA256

    8b191797f59eed06a02682638aef669c467eb1b0a205f4e525bd1ec0b1d13ddd

  • SHA512

    9cc88fe37bb0d21002b18916358c1d24ad1f10dabbbf952193536680aac1df3fc96dfab40d28a59c74c5186724fbda2c4227c090710d2ee2aafb6aebefb1b7d1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

nassimben.ddns.net:7711

Mutex

61c5d31221bfeea9f7198ff2ff7303ff

Attributes
  • reg_key

    61c5d31221bfeea9f7198ff2ff7303ff

  • splitter

    |'|'|

Targets

    • Target

      8b191797f59eed06a02682638aef669c467eb1b0a205f4e525bd1ec0b1d13ddd

    • Size

      155KB

    • MD5

      b5b82647f5478d76c7a6d03f56a4a5d4

    • SHA1

      adc613169ac58740eb92aa9e8bbd163f4c0079c0

    • SHA256

      8b191797f59eed06a02682638aef669c467eb1b0a205f4e525bd1ec0b1d13ddd

    • SHA512

      9cc88fe37bb0d21002b18916358c1d24ad1f10dabbbf952193536680aac1df3fc96dfab40d28a59c74c5186724fbda2c4227c090710d2ee2aafb6aebefb1b7d1

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks