General

  • Target

    a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198

  • Size

    31KB

  • Sample

    220520-z3pm4sddg2

  • MD5

    16f2cf1676d0f3c0333c84076f4faf3e

  • SHA1

    96f11640dd583e5b5121370ad6b133d214d7e6ec

  • SHA256

    a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198

  • SHA512

    51167837d0b0ec1662fbc9b4f41c1e5fcee392442474305680a215997d8f8aaa77fb640e470203f60dce400cc8f440526bdc4745083642748038dae0d7800cf3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

proverka

C2

0.tcp.ngrok.io:12168

Mutex

eb67deb6e8906041a3e951b1bc9895bf

Attributes
  • reg_key

    eb67deb6e8906041a3e951b1bc9895bf

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198

    • Size

      31KB

    • MD5

      16f2cf1676d0f3c0333c84076f4faf3e

    • SHA1

      96f11640dd583e5b5121370ad6b133d214d7e6ec

    • SHA256

      a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198

    • SHA512

      51167837d0b0ec1662fbc9b4f41c1e5fcee392442474305680a215997d8f8aaa77fb640e470203f60dce400cc8f440526bdc4745083642748038dae0d7800cf3

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Modifies Windows Firewall

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Tasks