General

  • Target

    c03ecd84149d907b8f5d94cc0a05f17c992e14fe6edadacf6fcd4e2c24ad4225

  • Size

    31KB

  • Sample

    220520-1vgszaecf8

  • MD5

    beb395aa0e40752fb1723a1244a6bccd

  • SHA1

    5be7634c81e1d315fd4fcd136f8835f7adfad34d

  • SHA256

    c03ecd84149d907b8f5d94cc0a05f17c992e14fe6edadacf6fcd4e2c24ad4225

  • SHA512

    4422f469612f668edc07fb9c85c3524746765777245708f9370485182dbbbb903882b3be302224c7f7f847920cccf22b98aca9b01fc4e8b512aa59c4163c34ed

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

chit na roblox

C2

192.168.0.11:7777

Mutex

edaa08b2575d115392c90c3f5fc35ac1

Attributes
  • reg_key

    edaa08b2575d115392c90c3f5fc35ac1

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      c03ecd84149d907b8f5d94cc0a05f17c992e14fe6edadacf6fcd4e2c24ad4225

    • Size

      31KB

    • MD5

      beb395aa0e40752fb1723a1244a6bccd

    • SHA1

      5be7634c81e1d315fd4fcd136f8835f7adfad34d

    • SHA256

      c03ecd84149d907b8f5d94cc0a05f17c992e14fe6edadacf6fcd4e2c24ad4225

    • SHA512

      4422f469612f668edc07fb9c85c3524746765777245708f9370485182dbbbb903882b3be302224c7f7f847920cccf22b98aca9b01fc4e8b512aa59c4163c34ed

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks