General

  • Target

    3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56

  • Size

    129KB

  • Sample

    220625-dfwbgsbebk

  • MD5

    e8c9a2905b86ab77e6a0db50ecff3c10

  • SHA1

    ab3a02c180404722d399e671ed4b1973bc03c8ce

  • SHA256

    3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56

  • SHA512

    d213916918dc973dde4df998e537bfa2f5c97e34eb5172e860f0dc12a6be2360357a8d134dbb843536362263a153e34e2f3173a997ad119c61d4359a190b8542

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ramial.no-ip.biz:1257

Mutex

e226bbcb766435e5c6575e6b41aa5e6d

Attributes
  • reg_key

    e226bbcb766435e5c6575e6b41aa5e6d

  • splitter

    |'|'|

Targets

    • Target

      3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56

    • Size

      129KB

    • MD5

      e8c9a2905b86ab77e6a0db50ecff3c10

    • SHA1

      ab3a02c180404722d399e671ed4b1973bc03c8ce

    • SHA256

      3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56

    • SHA512

      d213916918dc973dde4df998e537bfa2f5c97e34eb5172e860f0dc12a6be2360357a8d134dbb843536362263a153e34e2f3173a997ad119c61d4359a190b8542

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks