General

  • Target

    f2fb421609e2852f7e02a8ba392ae3d14323955c45cd009209983018127702d9

  • Size

    975KB

  • Sample

    220324-n9a8hsdchj

  • MD5

    ca72b73aba200b57bdc8db9e4e46bd10

  • SHA1

    742ca0e2a07ed00c810ea3cefdf11f863044b823

  • SHA256

    f2fb421609e2852f7e02a8ba392ae3d14323955c45cd009209983018127702d9

  • SHA512

    2232598e4458e1d83b10c73c44cb3311dfa7f1c5a6e39e3b098b23676a9e66d1cbf12e139d852246642d619b9fbb100b94f02864dc2d1990cb426a0685cba8a2

Malware Config

Extracted

Family

njrat

Botnet

Hacked By HiDDen PerSOn

Mutex

baefe8802707c492427873126d0983f6

Attributes
  • reg_key

    baefe8802707c492427873126d0983f6

Targets

    • Target

      f2fb421609e2852f7e02a8ba392ae3d14323955c45cd009209983018127702d9

    • Size

      975KB

    • MD5

      ca72b73aba200b57bdc8db9e4e46bd10

    • SHA1

      742ca0e2a07ed00c810ea3cefdf11f863044b823

    • SHA256

      f2fb421609e2852f7e02a8ba392ae3d14323955c45cd009209983018127702d9

    • SHA512

      2232598e4458e1d83b10c73c44cb3311dfa7f1c5a6e39e3b098b23676a9e66d1cbf12e139d852246642d619b9fbb100b94f02864dc2d1990cb426a0685cba8a2

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks