General

  • Target

    311df5f81e76a235f36fcff3d7065f967d554a6defd65868260a1bc5a058b975

  • Size

    32KB

  • Sample

    220520-e7874adabn

  • MD5

    40cf9d9625a09d91aeebde97dfbbddf5

  • SHA1

    e9135c997d89327ed666dc6129059f35e3d1f4e0

  • SHA256

    311df5f81e76a235f36fcff3d7065f967d554a6defd65868260a1bc5a058b975

  • SHA512

    2519d10b7d3c99c590a814906a5fb5d43d817d1b40c51324bd332957574a22f7700a5eba36a96f48656da84ade630b068bf115c32625bc9d753a10a55de9209d

Malware Config

Extracted

Family

njrat

Botnet

Hacked By HiDDen PerSOn

Mutex

b8337225bfe90b065d16d5fa335c7a1c

Attributes
  • reg_key

    b8337225bfe90b065d16d5fa335c7a1c

Targets

    • Target

      311df5f81e76a235f36fcff3d7065f967d554a6defd65868260a1bc5a058b975

    • Size

      32KB

    • MD5

      40cf9d9625a09d91aeebde97dfbbddf5

    • SHA1

      e9135c997d89327ed666dc6129059f35e3d1f4e0

    • SHA256

      311df5f81e76a235f36fcff3d7065f967d554a6defd65868260a1bc5a058b975

    • SHA512

      2519d10b7d3c99c590a814906a5fb5d43d817d1b40c51324bd332957574a22f7700a5eba36a96f48656da84ade630b068bf115c32625bc9d753a10a55de9209d

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks