General

  • Target

    1f8797a5ea837b256d7ecf7e3cd1fed52fcbd765e91c93975a69e56781806907

  • Size

    601KB

  • Sample

    220625-lvambsfdgj

  • MD5

    d9c8bd38f224c7a9708ea0699ea0411b

  • SHA1

    81d7ef1b4ab40e8aecedfc0964498d023c398b56

  • SHA256

    1f8797a5ea837b256d7ecf7e3cd1fed52fcbd765e91c93975a69e56781806907

  • SHA512

    8fa732f8d262911ca152b3555a2d134fe3919d105710f1c0877c60f2524113676c27910497171ca713082041480d0173064be6666ec23b93faee2ea2933f9b8a

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

134.249.177.58:1604

Mutex

262f5018bfdda234f289191972a2bad6

Attributes
  • reg_key

    262f5018bfdda234f289191972a2bad6

  • splitter

    |'|'|

Targets

    • Target

      1f8797a5ea837b256d7ecf7e3cd1fed52fcbd765e91c93975a69e56781806907

    • Size

      601KB

    • MD5

      d9c8bd38f224c7a9708ea0699ea0411b

    • SHA1

      81d7ef1b4ab40e8aecedfc0964498d023c398b56

    • SHA256

      1f8797a5ea837b256d7ecf7e3cd1fed52fcbd765e91c93975a69e56781806907

    • SHA512

      8fa732f8d262911ca152b3555a2d134fe3919d105710f1c0877c60f2524113676c27910497171ca713082041480d0173064be6666ec23b93faee2ea2933f9b8a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks