General

  • Target

    e0f2ca64adfd552026bccf9999757ad7a18e2b483598bfa87936dc573bbdcb78

  • Size

    309KB

  • Sample

    220520-3mxkkahbf2

  • MD5

    b4b37e58be879d3d2db7ed38e493cb90

  • SHA1

    64d18c155ffcfe5f5a92e2e9167660454abb8dba

  • SHA256

    e0f2ca64adfd552026bccf9999757ad7a18e2b483598bfa87936dc573bbdcb78

  • SHA512

    62e8678a51e39df456f3a8119c727a8378de880c5ff88ef4ef91702dbbe821a1c6c1f985f5e77c9819f49367c1792fc6eb05c3dfd0b4dcebd1f916b20f27d500

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

فاكك يو

C2

windows-background.ddns.net:1010

Mutex

b91787a4994aec6df4185bd0dc4cd953

Attributes
  • reg_key

    b91787a4994aec6df4185bd0dc4cd953

  • splitter

    |'|'|

Targets

    • Target

      e0f2ca64adfd552026bccf9999757ad7a18e2b483598bfa87936dc573bbdcb78

    • Size

      309KB

    • MD5

      b4b37e58be879d3d2db7ed38e493cb90

    • SHA1

      64d18c155ffcfe5f5a92e2e9167660454abb8dba

    • SHA256

      e0f2ca64adfd552026bccf9999757ad7a18e2b483598bfa87936dc573bbdcb78

    • SHA512

      62e8678a51e39df456f3a8119c727a8378de880c5ff88ef4ef91702dbbe821a1c6c1f985f5e77c9819f49367c1792fc6eb05c3dfd0b4dcebd1f916b20f27d500

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks