General

  • Target

    0x000b000000003c9f-55.dat

  • Size

    37KB

  • Sample

    220521-tsh5paddaq

  • MD5

    05d1abc69e538eb3c86bfeacc33c2a10

  • SHA1

    f424222562968f86d5d043cce57b1a0389061150

  • SHA256

    cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918

  • SHA512

    e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

WormRATT

C2

178.33.93.88:1742

Mutex

7869d44e9b90d6b1e669bf52c9e89c61

Attributes
  • reg_key

    7869d44e9b90d6b1e669bf52c9e89c61

  • splitter

    |'|'|

Targets

    • Target

      0x000b000000003c9f-55.dat

    • Size

      37KB

    • MD5

      05d1abc69e538eb3c86bfeacc33c2a10

    • SHA1

      f424222562968f86d5d043cce57b1a0389061150

    • SHA256

      cf37aa59e0d281f372b3801bcd62dba2dbf280d6f9edb48dc9c1565897d81918

    • SHA512

      e8aa15db240a82a24e8143df79fec3356e60942df6c26ca4ea995108d9e165292679dc94ea4ff55a7831ac0a47a938c45594733e48052aabf865284229751526

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks