General

  • Target

    b4b2eacff6bc86a3dfb035f67050dc53574fb10dda364c7f5c3258f4f2dff589

  • Size

    23KB

  • Sample

    220520-2nlc9affe5

  • MD5

    54aaf1fc91baedb708e3b7206bce1142

  • SHA1

    b1b0f90031a8a23637053cf7c0629764a1d20113

  • SHA256

    b4b2eacff6bc86a3dfb035f67050dc53574fb10dda364c7f5c3258f4f2dff589

  • SHA512

    f705ca7cd5ae5c68c1b54ed3897b0e2d4d0bc8ea8c5742d50a129f6c756c91498066f76c96d3cef632c3e8825b05f2ab4a303c4da36a7460d5df6077afe70f9a

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ytb

C2

170.78.228.248:1177

Mutex

df5733cef342467c069491e91efa63c5

Attributes
  • reg_key

    df5733cef342467c069491e91efa63c5

  • splitter

    |'|'|

Targets

    • Target

      b4b2eacff6bc86a3dfb035f67050dc53574fb10dda364c7f5c3258f4f2dff589

    • Size

      23KB

    • MD5

      54aaf1fc91baedb708e3b7206bce1142

    • SHA1

      b1b0f90031a8a23637053cf7c0629764a1d20113

    • SHA256

      b4b2eacff6bc86a3dfb035f67050dc53574fb10dda364c7f5c3258f4f2dff589

    • SHA512

      f705ca7cd5ae5c68c1b54ed3897b0e2d4d0bc8ea8c5742d50a129f6c756c91498066f76c96d3cef632c3e8825b05f2ab4a303c4da36a7460d5df6077afe70f9a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks