General

  • Target

    b7620a24e4b14325e2006bc96643bdb900e2ae07475471bb99c5eac13edf6a94

  • Size

    31KB

  • Sample

    220520-2gyd8sadfj

  • MD5

    3cc8c6b8f7c3b7b077323a63d1e1e068

  • SHA1

    8d8135b079c5909f772a2758cadf82a000c6a13e

  • SHA256

    b7620a24e4b14325e2006bc96643bdb900e2ae07475471bb99c5eac13edf6a94

  • SHA512

    1187366bdfc2ec5af3ff8027c7a6e7ccfc15df04f161a757062d9bc68d4d5d399bd3df442a802eab0a4e7ee6dedb15871cba544cfb41cfc5cb7a00a939c2e912

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

svchost

C2

192.168.0.106:7777

Mutex

37bc9f82f9eff86fa63ee0277897c3d0

Attributes
  • reg_key

    37bc9f82f9eff86fa63ee0277897c3d0

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      b7620a24e4b14325e2006bc96643bdb900e2ae07475471bb99c5eac13edf6a94

    • Size

      31KB

    • MD5

      3cc8c6b8f7c3b7b077323a63d1e1e068

    • SHA1

      8d8135b079c5909f772a2758cadf82a000c6a13e

    • SHA256

      b7620a24e4b14325e2006bc96643bdb900e2ae07475471bb99c5eac13edf6a94

    • SHA512

      1187366bdfc2ec5af3ff8027c7a6e7ccfc15df04f161a757062d9bc68d4d5d399bd3df442a802eab0a4e7ee6dedb15871cba544cfb41cfc5cb7a00a939c2e912

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks