General

  • Target

    d3da3546bd5966a5ec706ffa66843b63b39afda65381fba87936be75e31fd1fb

  • Size

    23KB

  • Sample

    220520-2ctkgsacbk

  • MD5

    26cad4264f77bd5a8599d59e47e6536e

  • SHA1

    cd584fe72f9d85d19115d716d85170ebfb198d69

  • SHA256

    d3da3546bd5966a5ec706ffa66843b63b39afda65381fba87936be75e31fd1fb

  • SHA512

    8c2a248af84eedf1639164fdf2c7c26599b37b3964c0c63c425378c7858683442dd76bfc4b6bc68db59b35d89484f55f28e35b39fb3ef002b5fbbe49dda5f1c9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.1.52:7777

Mutex

e9fd0cbfbe31f99b193288667d4fe48c

Attributes
  • reg_key

    e9fd0cbfbe31f99b193288667d4fe48c

  • splitter

    |'|'|

Targets

    • Target

      d3da3546bd5966a5ec706ffa66843b63b39afda65381fba87936be75e31fd1fb

    • Size

      23KB

    • MD5

      26cad4264f77bd5a8599d59e47e6536e

    • SHA1

      cd584fe72f9d85d19115d716d85170ebfb198d69

    • SHA256

      d3da3546bd5966a5ec706ffa66843b63b39afda65381fba87936be75e31fd1fb

    • SHA512

      8c2a248af84eedf1639164fdf2c7c26599b37b3964c0c63c425378c7858683442dd76bfc4b6bc68db59b35d89484f55f28e35b39fb3ef002b5fbbe49dda5f1c9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks