General

  • Target

    njSRC.exe

  • Size

    72KB

  • Sample

    220521-z1e1wsddg4

  • MD5

    97cb5e5d682b4dabae747fb83f2ab8fd

  • SHA1

    865eccfc883ef3df747d8cfc93f0e2dd463ad4e3

  • SHA256

    823d633ed0dd6822e1efa314ff214bd9128dd745e787426e1e4d9d781c7a57aa

  • SHA512

    ebfcb0fae917c3e055988b6f21454561e17d4e2b5cbe7373a4480ee788117a33b7fdf76482bbef6e8342bdc2751b1459e9624b657dd69849c8d714b74deec9fc

Malware Config

Targets

    • Target

      njSRC.exe

    • Size

      72KB

    • MD5

      97cb5e5d682b4dabae747fb83f2ab8fd

    • SHA1

      865eccfc883ef3df747d8cfc93f0e2dd463ad4e3

    • SHA256

      823d633ed0dd6822e1efa314ff214bd9128dd745e787426e1e4d9d781c7a57aa

    • SHA512

      ebfcb0fae917c3e055988b6f21454561e17d4e2b5cbe7373a4480ee788117a33b7fdf76482bbef6e8342bdc2751b1459e9624b657dd69849c8d714b74deec9fc

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks