General

  • Target

    c3daf76ae9091d522b94c3ce01b14b1472abf14cacb10123804b72bd7dbb99b3

  • Size

    579KB

  • Sample

    220701-dpy4qsbdh2

  • MD5

    4c4bde75b118d7db7df062e12a71a601

  • SHA1

    57446c07b6893592a2dcea4ffa4e80bb52fdfb53

  • SHA256

    c3daf76ae9091d522b94c3ce01b14b1472abf14cacb10123804b72bd7dbb99b3

  • SHA512

    f94d8f0dec04713a183d70860f6f90637fd0b14a14b78893df1ab99dcf70f582b1533a8569015800bebf855b09959693a332052dbe115706921f95aa12bf7bba

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

XmasMoney

C2

185.244.30.248:4040

Mutex

65846043dcc7fda8dafdf43614eb84ef

Attributes
  • reg_key

    65846043dcc7fda8dafdf43614eb84ef

  • splitter

    |'|'|

Targets

    • Target

      c3daf76ae9091d522b94c3ce01b14b1472abf14cacb10123804b72bd7dbb99b3

    • Size

      579KB

    • MD5

      4c4bde75b118d7db7df062e12a71a601

    • SHA1

      57446c07b6893592a2dcea4ffa4e80bb52fdfb53

    • SHA256

      c3daf76ae9091d522b94c3ce01b14b1472abf14cacb10123804b72bd7dbb99b3

    • SHA512

      f94d8f0dec04713a183d70860f6f90637fd0b14a14b78893df1ab99dcf70f582b1533a8569015800bebf855b09959693a332052dbe115706921f95aa12bf7bba

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks