General

  • Target

    afd38d10b07d1a5b228b06859f5d14880a2dbbe67ddb4f704c766958c0ed2753

  • Size

    31KB

  • Sample

    220521-ayvacsbac8

  • MD5

    4220f7bc0141d41906afd124d91416a0

  • SHA1

    b53ca3050299e632fd51fa688c5269c94efd2ce8

  • SHA256

    afd38d10b07d1a5b228b06859f5d14880a2dbbe67ddb4f704c766958c0ed2753

  • SHA512

    92d3f8d131e82e459cece183aface7c6df4d483e69a896793feeb4a3ef247a53d79b54830a58a15a5ec0b8be2ffb8fcd6af48f7c6ecae88ece5c4e74d3ca90c3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

q

C2

92.63.110.250:5433

Mutex

ec7b67d19f0d0cf1d90ebad49e01a947

Attributes
  • reg_key

    ec7b67d19f0d0cf1d90ebad49e01a947

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      afd38d10b07d1a5b228b06859f5d14880a2dbbe67ddb4f704c766958c0ed2753

    • Size

      31KB

    • MD5

      4220f7bc0141d41906afd124d91416a0

    • SHA1

      b53ca3050299e632fd51fa688c5269c94efd2ce8

    • SHA256

      afd38d10b07d1a5b228b06859f5d14880a2dbbe67ddb4f704c766958c0ed2753

    • SHA512

      92d3f8d131e82e459cece183aface7c6df4d483e69a896793feeb4a3ef247a53d79b54830a58a15a5ec0b8be2ffb8fcd6af48f7c6ecae88ece5c4e74d3ca90c3

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks