General

  • Target

    078a17bc3ccfd627cd652033fc75d5ce849bc6fcdb1cde37930e9a2c8a4f6351

  • Size

    31KB

  • Sample

    220502-w9y9cadcb4

  • MD5

    2c63a8d298cab96993df46136da3d57c

  • SHA1

    f1e3ddc38febbc6b90e16e913f842513446c061e

  • SHA256

    078a17bc3ccfd627cd652033fc75d5ce849bc6fcdb1cde37930e9a2c8a4f6351

  • SHA512

    6986d280b0f6713416c20eab8361c5735aa84c11b66d0e76e656b63f94f8b12912c1267882afd58c8cf8aecf41e580f456880fedffce5a2356283b1a02261412

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

hack

C2

192.168.14.1:6522

Mutex

e696b161ace58dfd3d7b61afe27390c1

Attributes
  • reg_key

    e696b161ace58dfd3d7b61afe27390c1

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      078a17bc3ccfd627cd652033fc75d5ce849bc6fcdb1cde37930e9a2c8a4f6351

    • Size

      31KB

    • MD5

      2c63a8d298cab96993df46136da3d57c

    • SHA1

      f1e3ddc38febbc6b90e16e913f842513446c061e

    • SHA256

      078a17bc3ccfd627cd652033fc75d5ce849bc6fcdb1cde37930e9a2c8a4f6351

    • SHA512

      6986d280b0f6713416c20eab8361c5735aa84c11b66d0e76e656b63f94f8b12912c1267882afd58c8cf8aecf41e580f456880fedffce5a2356283b1a02261412

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks