General

  • Target

    880ab8d8c5c0c1f1de079c6e74400c41106beda935bd7eaad9addecd868e6000

  • Size

    23KB

  • Sample

    220520-3xnqeaceek

  • MD5

    d9148d1fe12ddae97026b8b47d6b5788

  • SHA1

    4c796f8d10628a12ac7947ab04754fbc16e613d6

  • SHA256

    880ab8d8c5c0c1f1de079c6e74400c41106beda935bd7eaad9addecd868e6000

  • SHA512

    8077f47678b5690bc4ba91c6f1eb3da6dddade7ec47e412c30145cebc6e30b8abbbec4606d27dd0e9069a2396363bdf8d40a083caa4682f6ba0dd37ae6bb6e90

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

NO ICON

C2

fnhost1.ddns.net:1177

Mutex

04de9d8bb4c3f03c2c7f83c303b18ccc

Attributes
  • reg_key

    04de9d8bb4c3f03c2c7f83c303b18ccc

  • splitter

    |'|'|

Targets

    • Target

      880ab8d8c5c0c1f1de079c6e74400c41106beda935bd7eaad9addecd868e6000

    • Size

      23KB

    • MD5

      d9148d1fe12ddae97026b8b47d6b5788

    • SHA1

      4c796f8d10628a12ac7947ab04754fbc16e613d6

    • SHA256

      880ab8d8c5c0c1f1de079c6e74400c41106beda935bd7eaad9addecd868e6000

    • SHA512

      8077f47678b5690bc4ba91c6f1eb3da6dddade7ec47e412c30145cebc6e30b8abbbec4606d27dd0e9069a2396363bdf8d40a083caa4682f6ba0dd37ae6bb6e90

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks