General

  • Target

    16711fb77b9bdbb54d864698ea4a44f69f341569814a839edb62843ddfaa06fe

  • Size

    23KB

  • Sample

    220326-xq8jcagce2

  • MD5

    15d26cca384c7fbd2359d68cabf160a9

  • SHA1

    0ee750df654399e0021d7d6176f332a32b4ca9ec

  • SHA256

    16711fb77b9bdbb54d864698ea4a44f69f341569814a839edb62843ddfaa06fe

  • SHA512

    e112d0bd235979d4fdcd7f2cb29d7ee5b52631bea7117e04ee49e520c7546a862da78e7c125ade31a74ded962986039add8fe5b26ce000cf4d39b78933c0290d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

BackUp

C2

2.56.214.165:5552

Mutex

23d12d0af84ec3be5752121ae56aa4db

Attributes
  • reg_key

    23d12d0af84ec3be5752121ae56aa4db

  • splitter

    |'|'|

Targets

    • Target

      16711fb77b9bdbb54d864698ea4a44f69f341569814a839edb62843ddfaa06fe

    • Size

      23KB

    • MD5

      15d26cca384c7fbd2359d68cabf160a9

    • SHA1

      0ee750df654399e0021d7d6176f332a32b4ca9ec

    • SHA256

      16711fb77b9bdbb54d864698ea4a44f69f341569814a839edb62843ddfaa06fe

    • SHA512

      e112d0bd235979d4fdcd7f2cb29d7ee5b52631bea7117e04ee49e520c7546a862da78e7c125ade31a74ded962986039add8fe5b26ce000cf4d39b78933c0290d

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks