General

  • Target

    9625a01a03d5251f2b8b083cc2b8a4672aaf58e12cfd43697d0f14f786260258

  • Size

    37KB

  • Sample

    220630-wcztlsgdd9

  • MD5

    b14b1db088161ff6ade20058c947da24

  • SHA1

    9f8f8df3567d55a68cf3475d359f69333f052eb1

  • SHA256

    9625a01a03d5251f2b8b083cc2b8a4672aaf58e12cfd43697d0f14f786260258

  • SHA512

    8096db851a0df5f04a796825f762cf833787c48c904db1dfab853114ef83d7b064789a5955622213b71270589784378e6a7399f5827a3f9deefbf54d1a4f952e

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

mikus293.ddns.net:8808

Mutex

d7d375792b8e083dc0d1f19bf087e819

Attributes
  • reg_key

    d7d375792b8e083dc0d1f19bf087e819

  • splitter

    |'|'|

Targets

    • Target

      9625a01a03d5251f2b8b083cc2b8a4672aaf58e12cfd43697d0f14f786260258

    • Size

      37KB

    • MD5

      b14b1db088161ff6ade20058c947da24

    • SHA1

      9f8f8df3567d55a68cf3475d359f69333f052eb1

    • SHA256

      9625a01a03d5251f2b8b083cc2b8a4672aaf58e12cfd43697d0f14f786260258

    • SHA512

      8096db851a0df5f04a796825f762cf833787c48c904db1dfab853114ef83d7b064789a5955622213b71270589784378e6a7399f5827a3f9deefbf54d1a4f952e

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks