General

  • Target

    5710012c6323375e01de7eceb82944bd3d36943a1f74f27ba9d48b032a3080ad

  • Size

    31KB

  • Sample

    220520-16cy6ahhap

  • MD5

    e8c14a47cc53dd86138391651a09a4c7

  • SHA1

    5794068854ce62958b24b58ed87d1b5aedc2fd9d

  • SHA256

    5710012c6323375e01de7eceb82944bd3d36943a1f74f27ba9d48b032a3080ad

  • SHA512

    7c0244e3b29cd0a36ab7c1a80da6d9898e3bf72bfa6814f37d130a4f03129e2e0c1873594ba46f487a5fcf28a57a9fb43d66fe8b67d91e045fdece0bc41b186e

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

0.tcp.ngrok.io:10306

Mutex

07a2aa50592abb4c24711dae32977f5a

Attributes
  • reg_key

    07a2aa50592abb4c24711dae32977f5a

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      5710012c6323375e01de7eceb82944bd3d36943a1f74f27ba9d48b032a3080ad

    • Size

      31KB

    • MD5

      e8c14a47cc53dd86138391651a09a4c7

    • SHA1

      5794068854ce62958b24b58ed87d1b5aedc2fd9d

    • SHA256

      5710012c6323375e01de7eceb82944bd3d36943a1f74f27ba9d48b032a3080ad

    • SHA512

      7c0244e3b29cd0a36ab7c1a80da6d9898e3bf72bfa6814f37d130a4f03129e2e0c1873594ba46f487a5fcf28a57a9fb43d66fe8b67d91e045fdece0bc41b186e

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Modifies Windows Firewall

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Tasks