General

  • Target

    08a16325eb4523ff4193355516d182c1e8fcb3016409c92193f51053dd4fe180

  • Size

    123KB

  • Sample

    220503-sgjfmscddn

  • MD5

    946333d7d6a396ab789cb72f74c7f9aa

  • SHA1

    07391a865a6c0d781fae9754872d05437bd2ced5

  • SHA256

    08a16325eb4523ff4193355516d182c1e8fcb3016409c92193f51053dd4fe180

  • SHA512

    382cca85edecb737762c14eee850fc887745be8d1e33cf4f9521db42dcaed95d23c342532e015c6a7e792f2fde72161e064405147b3060850aa6d9139ed858df

Malware Config

Extracted

Family

njrat

Botnet

Hacked By HiDDen PerSOn

Mutex

e6be5f00f026aa28102ba2f0df8f3ec3

Attributes
  • reg_key

    e6be5f00f026aa28102ba2f0df8f3ec3

Targets

    • Target

      08a16325eb4523ff4193355516d182c1e8fcb3016409c92193f51053dd4fe180

    • Size

      123KB

    • MD5

      946333d7d6a396ab789cb72f74c7f9aa

    • SHA1

      07391a865a6c0d781fae9754872d05437bd2ced5

    • SHA256

      08a16325eb4523ff4193355516d182c1e8fcb3016409c92193f51053dd4fe180

    • SHA512

      382cca85edecb737762c14eee850fc887745be8d1e33cf4f9521db42dcaed95d23c342532e015c6a7e792f2fde72161e064405147b3060850aa6d9139ed858df

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks