General

  • Target

    9ff8be4e2eccb72adaaa262e44bff1a2445e759f3e284a91ca8b130ef836b4bc

  • Size

    23KB

  • Sample

    220701-gkljmagdc6

  • MD5

    d79fa6101c38f4bbcd81d853f0aa18bb

  • SHA1

    0df544e32c4b3c2f58cbd15c68af48dfb3b58200

  • SHA256

    9ff8be4e2eccb72adaaa262e44bff1a2445e759f3e284a91ca8b130ef836b4bc

  • SHA512

    9e4b244e0983882d9411e67a149fa32a5b1f8981dbdf004ce1358b4bb3daf7ba22483f127238d257cbab4eef3877f7876710bc53a72427f2b4ef9ce00b4dc86d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

198.169.0.1:1604

Mutex

8b8cfe492ab67f57b448c0add5ef7412

Attributes
  • reg_key

    8b8cfe492ab67f57b448c0add5ef7412

  • splitter

    |'|'|

Targets

    • Target

      9ff8be4e2eccb72adaaa262e44bff1a2445e759f3e284a91ca8b130ef836b4bc

    • Size

      23KB

    • MD5

      d79fa6101c38f4bbcd81d853f0aa18bb

    • SHA1

      0df544e32c4b3c2f58cbd15c68af48dfb3b58200

    • SHA256

      9ff8be4e2eccb72adaaa262e44bff1a2445e759f3e284a91ca8b130ef836b4bc

    • SHA512

      9e4b244e0983882d9411e67a149fa32a5b1f8981dbdf004ce1358b4bb3daf7ba22483f127238d257cbab4eef3877f7876710bc53a72427f2b4ef9ce00b4dc86d

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks