General

  • Target

    c4906d9e92bbbb0302f3409adb459b9bc31f75282780a9a56b6bff2bc908715b

  • Size

    168KB

  • Sample

    220702-xek9nsahc2

  • MD5

    0ead8bf1a82f825a23acba001fa5d8f4

  • SHA1

    d53abb4494d355f6954cea7ba866588593934992

  • SHA256

    c4906d9e92bbbb0302f3409adb459b9bc31f75282780a9a56b6bff2bc908715b

  • SHA512

    5fda6c76bb39547844114ded578f7881fa9433d8da45d4df67c48cc17a9fce90b90c918e9cc4611b6bb86cef444cb00b11f10d219d3d1eb33f713b4741f8dc05

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1234

Mutex

cc0012ca95288ee5cb550c3649e082f9

Attributes
  • reg_key

    cc0012ca95288ee5cb550c3649e082f9

  • splitter

    |'|'|

Targets

    • Target

      c4906d9e92bbbb0302f3409adb459b9bc31f75282780a9a56b6bff2bc908715b

    • Size

      168KB

    • MD5

      0ead8bf1a82f825a23acba001fa5d8f4

    • SHA1

      d53abb4494d355f6954cea7ba866588593934992

    • SHA256

      c4906d9e92bbbb0302f3409adb459b9bc31f75282780a9a56b6bff2bc908715b

    • SHA512

      5fda6c76bb39547844114ded578f7881fa9433d8da45d4df67c48cc17a9fce90b90c918e9cc4611b6bb86cef444cb00b11f10d219d3d1eb33f713b4741f8dc05

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks