General

  • Target

    7eb83124847b72be762fe19ab6df81a664f4b6be2dc73bcc0ea446ab42457d58

  • Size

    93KB

  • Sample

    220701-hfsmtagcfk

  • MD5

    6c6da35cdba7d22e8ac78b3752ce54f2

  • SHA1

    50b92602a1ecc2ee5998d409e8310741f3a8bcac

  • SHA256

    7eb83124847b72be762fe19ab6df81a664f4b6be2dc73bcc0ea446ab42457d58

  • SHA512

    8ae128012fe457b14738c2018d1fa6ebde8189f604eff668977a07d0a9c255d3c4ac34b096b30a7e0aa83382b0b6dcdb05bff93e216f3566bf8a6874b5c81f6a

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

hey

C2

FRANSESCOTI3LjAuFRANSESCOC4x:Nzc3Nw==

Mutex

12ac2e76abe6e325d355ee60632a103f

Attributes
  • reg_key

    12ac2e76abe6e325d355ee60632a103f

  • splitter

    |'|'|

Targets

    • Target

      7eb83124847b72be762fe19ab6df81a664f4b6be2dc73bcc0ea446ab42457d58

    • Size

      93KB

    • MD5

      6c6da35cdba7d22e8ac78b3752ce54f2

    • SHA1

      50b92602a1ecc2ee5998d409e8310741f3a8bcac

    • SHA256

      7eb83124847b72be762fe19ab6df81a664f4b6be2dc73bcc0ea446ab42457d58

    • SHA512

      8ae128012fe457b14738c2018d1fa6ebde8189f604eff668977a07d0a9c255d3c4ac34b096b30a7e0aa83382b0b6dcdb05bff93e216f3566bf8a6874b5c81f6a

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks