General

  • Target

    7a535a6d9d4925e4c30b23a00bee6e90f50e69e2d7fa702e49b5bc7b7ec770f9

  • Size

    3.3MB

  • Sample

    220630-yl78fsagcj

  • MD5

    5fdb4467d3af6354416696aeab904fe3

  • SHA1

    a6faa74248c429e454744e0d8de759b5ec4ee6e6

  • SHA256

    7a535a6d9d4925e4c30b23a00bee6e90f50e69e2d7fa702e49b5bc7b7ec770f9

  • SHA512

    e39a36b691346f489673c5d3656d8d7208a893e48a3f5b714aebad0640864af21854777865e9a8c91ed2bd845621c1d98703a27be1a6ccf1bcade3a05889a215

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

OpenPort5327-59758.portmap.io:59758

Mutex

bc3cca920e0c4884738f7af46734518b

Attributes
  • reg_key

    bc3cca920e0c4884738f7af46734518b

  • splitter

    |'|'|

Targets

    • Target

      7a535a6d9d4925e4c30b23a00bee6e90f50e69e2d7fa702e49b5bc7b7ec770f9

    • Size

      3.3MB

    • MD5

      5fdb4467d3af6354416696aeab904fe3

    • SHA1

      a6faa74248c429e454744e0d8de759b5ec4ee6e6

    • SHA256

      7a535a6d9d4925e4c30b23a00bee6e90f50e69e2d7fa702e49b5bc7b7ec770f9

    • SHA512

      e39a36b691346f489673c5d3656d8d7208a893e48a3f5b714aebad0640864af21854777865e9a8c91ed2bd845621c1d98703a27be1a6ccf1bcade3a05889a215

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks