General

  • Target

    3bdc59efa34736457c7bb023c755470ef3bd29b81f733e59b2594f6373f876c3

  • Size

    852KB

  • Sample

    220703-ldd87afga3

  • MD5

    176b5acb7e99a0f6b96e67008211a6ba

  • SHA1

    3cc11249673f7d66ce36da881a461c12a435e421

  • SHA256

    3bdc59efa34736457c7bb023c755470ef3bd29b81f733e59b2594f6373f876c3

  • SHA512

    168744ff4454a49666092694bd2949d3bc5d50703d855077651fff3ba7be91e398d053a4fe797cdc74bfdfb52c8fa1e765bd4989ef46b47949610c5eb05ddf5a

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

shadowpro87.ddns.net:1177

Mutex

9165950e91e4e361fa21d31cf1cfc39b

Attributes
  • reg_key

    9165950e91e4e361fa21d31cf1cfc39b

  • splitter

    |'|'|

Targets

    • Target

      3bdc59efa34736457c7bb023c755470ef3bd29b81f733e59b2594f6373f876c3

    • Size

      852KB

    • MD5

      176b5acb7e99a0f6b96e67008211a6ba

    • SHA1

      3cc11249673f7d66ce36da881a461c12a435e421

    • SHA256

      3bdc59efa34736457c7bb023c755470ef3bd29b81f733e59b2594f6373f876c3

    • SHA512

      168744ff4454a49666092694bd2949d3bc5d50703d855077651fff3ba7be91e398d053a4fe797cdc74bfdfb52c8fa1e765bd4989ef46b47949610c5eb05ddf5a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks