General

  • Target

    6f206c1cf8a3a89d1c924093ad7b14afaa38bb838cd63f46ac5a6d4aeea917ae

  • Size

    31KB

  • Sample

    220520-3wwdvscecj

  • MD5

    8ab046221d4c82b7bc8af25d66681f12

  • SHA1

    25f1eeebfa85eed09859013bd16ff95e15b720e5

  • SHA256

    6f206c1cf8a3a89d1c924093ad7b14afaa38bb838cd63f46ac5a6d4aeea917ae

  • SHA512

    f0a5c2a48d7f51b309f7da8faef4dee4a8783684f62cfa9bdd692f96640e8fb8b0df4adfb1bf8f053aaaf768d8fa571137fddc659701183f967eb86d131d9a6b

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

178.33.93.88:80

Mutex

6412632678fd7af8e4c57ca548c07ab3

Attributes
  • reg_key

    6412632678fd7af8e4c57ca548c07ab3

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      6f206c1cf8a3a89d1c924093ad7b14afaa38bb838cd63f46ac5a6d4aeea917ae

    • Size

      31KB

    • MD5

      8ab046221d4c82b7bc8af25d66681f12

    • SHA1

      25f1eeebfa85eed09859013bd16ff95e15b720e5

    • SHA256

      6f206c1cf8a3a89d1c924093ad7b14afaa38bb838cd63f46ac5a6d4aeea917ae

    • SHA512

      f0a5c2a48d7f51b309f7da8faef4dee4a8783684f62cfa9bdd692f96640e8fb8b0df4adfb1bf8f053aaaf768d8fa571137fddc659701183f967eb86d131d9a6b

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks