General

  • Target

    b1da0aa9e05b36cc0d53409fa8279582.exe

  • Size

    37KB

  • Sample

    220530-fnjnrsdhb4

  • MD5

    b1da0aa9e05b36cc0d53409fa8279582

  • SHA1

    1ff6a357002708914603a20004516cf0d94141d7

  • SHA256

    8b725290e97a3be8c3c8d1b9d463d57a31c09e76ac0321be39d5c408b4d51d3a

  • SHA512

    64a173b77776d8eaca092cd8fb310202f83efbb2f83526334c658e0a929d6449b8376ff7f79f38c45b85883a1e78eb65a64b15deb658bc6f0eee1466f6dfdd23

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

BOT

C2

2.tcp.eu.ngrok.io:15441

Mutex

88489d1083fd6ed1fecee39e01330c6c

Attributes
  • reg_key

    88489d1083fd6ed1fecee39e01330c6c

  • splitter

    |'|'|

Targets

    • Target

      b1da0aa9e05b36cc0d53409fa8279582.exe

    • Size

      37KB

    • MD5

      b1da0aa9e05b36cc0d53409fa8279582

    • SHA1

      1ff6a357002708914603a20004516cf0d94141d7

    • SHA256

      8b725290e97a3be8c3c8d1b9d463d57a31c09e76ac0321be39d5c408b4d51d3a

    • SHA512

      64a173b77776d8eaca092cd8fb310202f83efbb2f83526334c658e0a929d6449b8376ff7f79f38c45b85883a1e78eb65a64b15deb658bc6f0eee1466f6dfdd23

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks