General

  • Target

    1042569cf8c6c21808032769a56ccb596f9d7226e5dbbf689b3dc5f91013087e

  • Size

    31KB

  • Sample

    220520-3p11rscbhn

  • MD5

    863d99f742f8d643ed331365ae39dd8e

  • SHA1

    485903e35a73d6fa7b7bb4b7fdcf03831f4493f2

  • SHA256

    1042569cf8c6c21808032769a56ccb596f9d7226e5dbbf689b3dc5f91013087e

  • SHA512

    1583397cbba9609864a8107f7ee8a7c82d46d63b1e7fcef137855f32c619008f8e84047311d57abab4f03f284ca5405a838ccf97fa9837b5fd69015a92b64718

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

kyky

C2

109.202.54.48:6522

Mutex

99e954fa342acd7726c6a160817080c2

Attributes
  • reg_key

    99e954fa342acd7726c6a160817080c2

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      1042569cf8c6c21808032769a56ccb596f9d7226e5dbbf689b3dc5f91013087e

    • Size

      31KB

    • MD5

      863d99f742f8d643ed331365ae39dd8e

    • SHA1

      485903e35a73d6fa7b7bb4b7fdcf03831f4493f2

    • SHA256

      1042569cf8c6c21808032769a56ccb596f9d7226e5dbbf689b3dc5f91013087e

    • SHA512

      1583397cbba9609864a8107f7ee8a7c82d46d63b1e7fcef137855f32c619008f8e84047311d57abab4f03f284ca5405a838ccf97fa9837b5fd69015a92b64718

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks