General

  • Target

    0d34e4a38d17ead9fc6df6246ef2236431ef8c3eb3e2405296523bd0aeb0bf4a

  • Size

    31KB

  • Sample

    220630-3ladmscdgm

  • MD5

    ebc930f3763f7740edfc2703b4da793d

  • SHA1

    b71e3d01f1c2e57cbb701accdac4636822f5c9b1

  • SHA256

    0d34e4a38d17ead9fc6df6246ef2236431ef8c3eb3e2405296523bd0aeb0bf4a

  • SHA512

    92a6d095ed556ec8fef390013eec942989df47afb95b274367ce4b5ceafe72f070eac4ba4c94be9c9cb9b0753ebec519d8e626eb6e0cba42e71feb83f7e91f23

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Chrome

C2

10.0.2.15:6522

Mutex

2551e9f9a68b247906ab7c6522140255

Attributes
  • reg_key

    2551e9f9a68b247906ab7c6522140255

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      0d34e4a38d17ead9fc6df6246ef2236431ef8c3eb3e2405296523bd0aeb0bf4a

    • Size

      31KB

    • MD5

      ebc930f3763f7740edfc2703b4da793d

    • SHA1

      b71e3d01f1c2e57cbb701accdac4636822f5c9b1

    • SHA256

      0d34e4a38d17ead9fc6df6246ef2236431ef8c3eb3e2405296523bd0aeb0bf4a

    • SHA512

      92a6d095ed556ec8fef390013eec942989df47afb95b274367ce4b5ceafe72f070eac4ba4c94be9c9cb9b0753ebec519d8e626eb6e0cba42e71feb83f7e91f23

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks