General

  • Target

    85d2e74a9e73e63c5997925b2b1df793e6f76b9268638f74ca63dd9e40639d78

  • Size

    37KB

  • Sample

    220520-13qe3seeg9

  • MD5

    b17291cf76f23046781e1aa520ebeb96

  • SHA1

    c3f4a0a08e5202641a2ee0836e881f66a9f27884

  • SHA256

    85d2e74a9e73e63c5997925b2b1df793e6f76b9268638f74ca63dd9e40639d78

  • SHA512

    011b3247a7182a67dc07f66f9915b14e8fc85dc8e74ce6fda167b37d7a49fa663bdc46a7f5c1304ad8eec14b24c3c0859cf354eaee9e24c53a36f3b6f27ba3f2

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

25.75.145.231:5552

Mutex

ed293bf15219f4884f56d44c1634e70f

Attributes
  • reg_key

    ed293bf15219f4884f56d44c1634e70f

  • splitter

    |'|'|

Targets

    • Target

      85d2e74a9e73e63c5997925b2b1df793e6f76b9268638f74ca63dd9e40639d78

    • Size

      37KB

    • MD5

      b17291cf76f23046781e1aa520ebeb96

    • SHA1

      c3f4a0a08e5202641a2ee0836e881f66a9f27884

    • SHA256

      85d2e74a9e73e63c5997925b2b1df793e6f76b9268638f74ca63dd9e40639d78

    • SHA512

      011b3247a7182a67dc07f66f9915b14e8fc85dc8e74ce6fda167b37d7a49fa663bdc46a7f5c1304ad8eec14b24c3c0859cf354eaee9e24c53a36f3b6f27ba3f2

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks