General

  • Target

    fdc9b22a9a4babb44c95f67de6e09a8e8a5ab0c805141739fa81c88ef99d84db

  • Size

    54KB

  • Sample

    220701-hvn8yaaff4

  • MD5

    0b0be038a905dfbdd3c957664f7567e7

  • SHA1

    05c0cf8270dbb2015ccecbeba4b5d54ddcf92d48

  • SHA256

    fdc9b22a9a4babb44c95f67de6e09a8e8a5ab0c805141739fa81c88ef99d84db

  • SHA512

    cfd01a4175b846c1e0e6324c392eb3100c33009ddb2cffa077f49df902277b9e4744b655182bf8c750961ddc1a3174aa830c5477465633a71c3ef7cfd2ab6963

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

<<%M%>>

C2

ihebmokhles.no-ip.org:1177

Mutex

854084595525f7929d7da906e0d2d84a

Attributes
  • reg_key

    854084595525f7929d7da906e0d2d84a

  • splitter

    |'|'|

Targets

    • Target

      fdc9b22a9a4babb44c95f67de6e09a8e8a5ab0c805141739fa81c88ef99d84db

    • Size

      54KB

    • MD5

      0b0be038a905dfbdd3c957664f7567e7

    • SHA1

      05c0cf8270dbb2015ccecbeba4b5d54ddcf92d48

    • SHA256

      fdc9b22a9a4babb44c95f67de6e09a8e8a5ab0c805141739fa81c88ef99d84db

    • SHA512

      cfd01a4175b846c1e0e6324c392eb3100c33009ddb2cffa077f49df902277b9e4744b655182bf8c750961ddc1a3174aa830c5477465633a71c3ef7cfd2ab6963

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks