General

  • Target

    053813c8b9f738f9428d75fc1eda6a189f1926d2d77b219d4f0f98647219673c

  • Size

    23KB

  • Sample

    220520-3a4hcagef3

  • MD5

    a81fbdcd88ec62ad6a264e21e7634738

  • SHA1

    51dae7eb156317ee935dfb82050b135da0288e30

  • SHA256

    053813c8b9f738f9428d75fc1eda6a189f1926d2d77b219d4f0f98647219673c

  • SHA512

    a54c6fb2a179b0571532b126c49b0ffeffbba07dda48fb7e19324a9424c1f5b0e2b121e9fd0145eb552d6b371480c21edf112c4d68924ad7d91afd23fa8ec51b

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Fast.exe

C2

127.0.0.1:3158

Mutex

59a4c7d5a45bd632bb2583e1dc4664dd

Attributes
  • reg_key

    59a4c7d5a45bd632bb2583e1dc4664dd

  • splitter

    |'|'|

Targets

    • Target

      053813c8b9f738f9428d75fc1eda6a189f1926d2d77b219d4f0f98647219673c

    • Size

      23KB

    • MD5

      a81fbdcd88ec62ad6a264e21e7634738

    • SHA1

      51dae7eb156317ee935dfb82050b135da0288e30

    • SHA256

      053813c8b9f738f9428d75fc1eda6a189f1926d2d77b219d4f0f98647219673c

    • SHA512

      a54c6fb2a179b0571532b126c49b0ffeffbba07dda48fb7e19324a9424c1f5b0e2b121e9fd0145eb552d6b371480c21edf112c4d68924ad7d91afd23fa8ec51b

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks