General

  • Target

    af6b174b10f33702e21eb411d5fc31292efed525cd890272fc2106d369e0dbc3

  • Size

    31KB

  • Sample

    220520-29atmsbden

  • MD5

    62c337ee155d4fa14aa8167dc0bdea39

  • SHA1

    78c8ef2e1d7940774d79784b3b2806f440d2a122

  • SHA256

    af6b174b10f33702e21eb411d5fc31292efed525cd890272fc2106d369e0dbc3

  • SHA512

    57646c960ff8b3695096229438556aa0b1227d85319e940f0c6a592fa3209ffc8feaed8bad5fc44421af052e607175b16a07b1a9248f09582cb22046d9fa3afe

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

ggwp90wp.hopto.org:80

Mutex

b911e107642d6002d2b783984c2e57a9

Attributes
  • reg_key

    b911e107642d6002d2b783984c2e57a9

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      af6b174b10f33702e21eb411d5fc31292efed525cd890272fc2106d369e0dbc3

    • Size

      31KB

    • MD5

      62c337ee155d4fa14aa8167dc0bdea39

    • SHA1

      78c8ef2e1d7940774d79784b3b2806f440d2a122

    • SHA256

      af6b174b10f33702e21eb411d5fc31292efed525cd890272fc2106d369e0dbc3

    • SHA512

      57646c960ff8b3695096229438556aa0b1227d85319e940f0c6a592fa3209ffc8feaed8bad5fc44421af052e607175b16a07b1a9248f09582cb22046d9fa3afe

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks