General

  • Target

    bd6a7a95b6a622700a3b3227c5d501024635a23040a1a8c2d57bd297e40283de

  • Size

    330KB

  • Sample

    220630-v5pzfagac7

  • MD5

    d9efea40f55230d9a7ef1abf4ec714f9

  • SHA1

    e85bae111eb20c2f2274f082a3db5130dd432c52

  • SHA256

    bd6a7a95b6a622700a3b3227c5d501024635a23040a1a8c2d57bd297e40283de

  • SHA512

    78ec965786df90216ce25fc54af0f018147c853280d0e209a73fecf90924fc9d5f8a13f4ff76632d5a993fb47eac75f614708a84732df6e3101f3b8ac893b6b6

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

lusika.ddns.net:4546

Mutex

7287e911ef603f275a9cc4b3d587d24a

Attributes
  • reg_key

    7287e911ef603f275a9cc4b3d587d24a

  • splitter

    |'|'|

Targets

    • Target

      bd6a7a95b6a622700a3b3227c5d501024635a23040a1a8c2d57bd297e40283de

    • Size

      330KB

    • MD5

      d9efea40f55230d9a7ef1abf4ec714f9

    • SHA1

      e85bae111eb20c2f2274f082a3db5130dd432c52

    • SHA256

      bd6a7a95b6a622700a3b3227c5d501024635a23040a1a8c2d57bd297e40283de

    • SHA512

      78ec965786df90216ce25fc54af0f018147c853280d0e209a73fecf90924fc9d5f8a13f4ff76632d5a993fb47eac75f614708a84732df6e3101f3b8ac893b6b6

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks