General

  • Target

    d9650f2c1f89253bc02c64204c65668e7ec01227a4b5b40d8793499c9c1ad2c8

  • Size

    406KB

  • Sample

    220203-shqw4sahhr

  • MD5

    27618e24c576d88396237132b13e0b7a

  • SHA1

    5c7055878d8dd12a8bff678194f054ba74328a28

  • SHA256

    d9650f2c1f89253bc02c64204c65668e7ec01227a4b5b40d8793499c9c1ad2c8

  • SHA512

    37250461692acc1cd34a0f406d8eb1b3043c06afdb91b598cecf19dbdac95f909c9cb36246a730fdfd215aabcb8af21529e96431e70a2cb3a5c2487945010055

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

hack

C2

medalwaely.no-ip.biz:1177

Mutex

09b4965ef3d07401b926a3a4b3383a3f

Attributes
  • reg_key

    09b4965ef3d07401b926a3a4b3383a3f

  • splitter

    |'|'|

Targets

    • Target

      d9650f2c1f89253bc02c64204c65668e7ec01227a4b5b40d8793499c9c1ad2c8

    • Size

      406KB

    • MD5

      27618e24c576d88396237132b13e0b7a

    • SHA1

      5c7055878d8dd12a8bff678194f054ba74328a28

    • SHA256

      d9650f2c1f89253bc02c64204c65668e7ec01227a4b5b40d8793499c9c1ad2c8

    • SHA512

      37250461692acc1cd34a0f406d8eb1b3043c06afdb91b598cecf19dbdac95f909c9cb36246a730fdfd215aabcb8af21529e96431e70a2cb3a5c2487945010055

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks