General

  • Target

    bb7fbf7dfd559af71db3c355d97214d26d2098f69ae959303184c534dd059c44

  • Size

    110KB

  • Sample

    220524-1m879ahbc9

  • MD5

    c9d0eece004f12a6a018b45cb1f3a436

  • SHA1

    ae37507040318d5e686ed3684caf26aa1d7c554d

  • SHA256

    bb7fbf7dfd559af71db3c355d97214d26d2098f69ae959303184c534dd059c44

  • SHA512

    f1765d0f16bf34cf118c7a85af8dd80ec6a80044e5ad85ce422dd241488fa74b3cedb98cdc7a529b099b3c6cc91c08d31e2312205c67ea2c55dde91e80926f54

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

45.134.220.164:9797

Mutex

5f805e177fa7c673482c92c255460b67

Attributes
  • reg_key

    5f805e177fa7c673482c92c255460b67

  • splitter

    |'|'|

Targets

    • Target

      bb7fbf7dfd559af71db3c355d97214d26d2098f69ae959303184c534dd059c44

    • Size

      110KB

    • MD5

      c9d0eece004f12a6a018b45cb1f3a436

    • SHA1

      ae37507040318d5e686ed3684caf26aa1d7c554d

    • SHA256

      bb7fbf7dfd559af71db3c355d97214d26d2098f69ae959303184c534dd059c44

    • SHA512

      f1765d0f16bf34cf118c7a85af8dd80ec6a80044e5ad85ce422dd241488fa74b3cedb98cdc7a529b099b3c6cc91c08d31e2312205c67ea2c55dde91e80926f54

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Neshta Payload

    • Modifies Windows Defender Real-time Protection settings

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks