General

  • Target

    999e3e79844299f643e2addfc8b8142f090be16a56c287d73e97179085a91905

  • Size

    203KB

  • Sample

    220521-af42vaabg7

  • MD5

    80ad24837a1502c5137eff0689879e87

  • SHA1

    5189989a7000c8b54164b5217b3813d5025ec72d

  • SHA256

    999e3e79844299f643e2addfc8b8142f090be16a56c287d73e97179085a91905

  • SHA512

    6ea82775a0c6d401b22e3ac267aa2345465d8e95529f650636e0d0dab9757d1eda6faafd5e0abcba585d1f430085ad686232189ee23da0ad20e0aaaf3ad30e07

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Biomusor

C2

valeraservice.hopto.org:3725

Mutex

c09891880ad4e747f696c8d81f2ec88b

Attributes
  • reg_key

    c09891880ad4e747f696c8d81f2ec88b

  • splitter

    |'|'|

Targets

    • Target

      999e3e79844299f643e2addfc8b8142f090be16a56c287d73e97179085a91905

    • Size

      203KB

    • MD5

      80ad24837a1502c5137eff0689879e87

    • SHA1

      5189989a7000c8b54164b5217b3813d5025ec72d

    • SHA256

      999e3e79844299f643e2addfc8b8142f090be16a56c287d73e97179085a91905

    • SHA512

      6ea82775a0c6d401b22e3ac267aa2345465d8e95529f650636e0d0dab9757d1eda6faafd5e0abcba585d1f430085ad686232189ee23da0ad20e0aaaf3ad30e07

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks