General

  • Target

    Discord Tokken Grabber.exe

  • Size

    98KB

  • Sample

    220424-vgdaqshfh3

  • MD5

    75c86f9a030999c57b68690c7a727862

  • SHA1

    6b046349d789bf6679c465ccfb0d21402077616c

  • SHA256

    7da38e7a350512181bf0bc5e737b6f40208428b72ad578ecfb9bf729af98f172

  • SHA512

    9df16e44273a6ecc47deaac5d3c409d78188b9d0500dbe27d071312dcb834e9f54114dfae003214a7d81ccfd135e312be9e5e762b16d21c2da1bdc698eeeac16

Malware Config

Extracted

Family

njrat

Botnet

Hacked By HiDDen PerSOn

Mutex

b238f740560279557e7f122983c7ba65

Attributes
  • reg_key

    b238f740560279557e7f122983c7ba65

Targets

    • Target

      Discord Tokken Grabber.exe

    • Size

      98KB

    • MD5

      75c86f9a030999c57b68690c7a727862

    • SHA1

      6b046349d789bf6679c465ccfb0d21402077616c

    • SHA256

      7da38e7a350512181bf0bc5e737b6f40208428b72ad578ecfb9bf729af98f172

    • SHA512

      9df16e44273a6ecc47deaac5d3c409d78188b9d0500dbe27d071312dcb834e9f54114dfae003214a7d81ccfd135e312be9e5e762b16d21c2da1bdc698eeeac16

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks