General

  • Target

    8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed

  • Size

    3.2MB

  • Sample

    220630-ym4xesceb5

  • MD5

    30fb03c95b0bab5bf680d8c08592ed46

  • SHA1

    a3797aeb14ab3ac4f4215cca8f5dac6d9f61294b

  • SHA256

    8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed

  • SHA512

    1567cc9902b40b9c9aa4607029e1022910129332c5a4869b005465b9fc0b444b457f918b1546393032f78e14ba5de867775bb361d629b2dcc01ba5e65f7a5387

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

212683d986fb740ad6a40184df48e604

Attributes
  • reg_key

    212683d986fb740ad6a40184df48e604

  • splitter

    |'|'|

Targets

    • Target

      8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed

    • Size

      3.2MB

    • MD5

      30fb03c95b0bab5bf680d8c08592ed46

    • SHA1

      a3797aeb14ab3ac4f4215cca8f5dac6d9f61294b

    • SHA256

      8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed

    • SHA512

      1567cc9902b40b9c9aa4607029e1022910129332c5a4869b005465b9fc0b444b457f918b1546393032f78e14ba5de867775bb361d629b2dcc01ba5e65f7a5387

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks