General

  • Target

    3634048707083bfcd9ab1f27f0bf0420b261eaaa40ecc9c86ef3758262614b7b

  • Size

    23KB

  • Sample

    220626-dtn5bsfadn

  • MD5

    55bc0ba7e8f548de834a7090d6d08ab4

  • SHA1

    93b660785a6e89f98d2ef8f4145e916410e7475f

  • SHA256

    3634048707083bfcd9ab1f27f0bf0420b261eaaa40ecc9c86ef3758262614b7b

  • SHA512

    d569cd8d541639b53fd0ce0724e94bcb137859470a83bcad6dbf142f2d5bd23d741ebdece09bb2c4cf7516c94a2e8c1934bd3bef37b9efb68efbf9eed00932bf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Thank you for installing!

C2

127.0.0.1:1528

Mutex

769d5da68f5544d1b5dd487359601c51

Attributes
  • reg_key

    769d5da68f5544d1b5dd487359601c51

  • splitter

    |'|'|

Targets

    • Target

      3634048707083bfcd9ab1f27f0bf0420b261eaaa40ecc9c86ef3758262614b7b

    • Size

      23KB

    • MD5

      55bc0ba7e8f548de834a7090d6d08ab4

    • SHA1

      93b660785a6e89f98d2ef8f4145e916410e7475f

    • SHA256

      3634048707083bfcd9ab1f27f0bf0420b261eaaa40ecc9c86ef3758262614b7b

    • SHA512

      d569cd8d541639b53fd0ce0724e94bcb137859470a83bcad6dbf142f2d5bd23d741ebdece09bb2c4cf7516c94a2e8c1934bd3bef37b9efb68efbf9eed00932bf

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks