General

  • Target

    b39589d6427aa2666b54f1b09cfeae25fd62c135293688cc91e854ac3097a898

  • Size

    32KB

  • Sample

    220524-t3x2laddfj

  • MD5

    e2e21e957f11bdeece53d32ef7a87200

  • SHA1

    163e343f1145112c70b9dfb769e1edd95aeea727

  • SHA256

    b39589d6427aa2666b54f1b09cfeae25fd62c135293688cc91e854ac3097a898

  • SHA512

    dd3befe3490377cb89a56b7096f9c0cf77632656940b0c8153d50b28d1e030fcd624a1ecb5b99e9248ef3f086505753778997fdf7b7f15d3855279781a9154da

Malware Config

Extracted

Family

njrat

Botnet

Hacked By HiDDen PerSOn

Mutex

4bdd702755ab14d7cb87b9060eac7a2c

Attributes
  • reg_key

    4bdd702755ab14d7cb87b9060eac7a2c

Targets

    • Target

      b39589d6427aa2666b54f1b09cfeae25fd62c135293688cc91e854ac3097a898

    • Size

      32KB

    • MD5

      e2e21e957f11bdeece53d32ef7a87200

    • SHA1

      163e343f1145112c70b9dfb769e1edd95aeea727

    • SHA256

      b39589d6427aa2666b54f1b09cfeae25fd62c135293688cc91e854ac3097a898

    • SHA512

      dd3befe3490377cb89a56b7096f9c0cf77632656940b0c8153d50b28d1e030fcd624a1ecb5b99e9248ef3f086505753778997fdf7b7f15d3855279781a9154da

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks