General

  • Target

    8097383fc8d67a40c647b8e892fc7a28a68dc82fa16f51303ae99a5e82c61969

  • Size

    919KB

  • Sample

    220625-mmrfjsgfgm

  • MD5

    396b59946e1211f68e52677de66ccbc6

  • SHA1

    fd051f956b1a6764945464666395b077f2ea5462

  • SHA256

    8097383fc8d67a40c647b8e892fc7a28a68dc82fa16f51303ae99a5e82c61969

  • SHA512

    65030131559f23b61503da19e5725527847247d349022441f07dfdb47a58085484f2825624a6a9feb8bbfe0048a46bd37afe73cd409262bcbbfdd9df538a4712

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

fourth#4

C2

soft98.linkpc.net:5550

Mutex

10e93180d6481ad63a77c2b255d40864

Attributes
  • reg_key

    10e93180d6481ad63a77c2b255d40864

  • splitter

    |'|'|

Targets

    • Target

      8097383fc8d67a40c647b8e892fc7a28a68dc82fa16f51303ae99a5e82c61969

    • Size

      919KB

    • MD5

      396b59946e1211f68e52677de66ccbc6

    • SHA1

      fd051f956b1a6764945464666395b077f2ea5462

    • SHA256

      8097383fc8d67a40c647b8e892fc7a28a68dc82fa16f51303ae99a5e82c61969

    • SHA512

      65030131559f23b61503da19e5725527847247d349022441f07dfdb47a58085484f2825624a6a9feb8bbfe0048a46bd37afe73cd409262bcbbfdd9df538a4712

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Tasks