General

  • Target

    0x000b000000003c9f-55.dat

  • Size

    37KB

  • Sample

    220704-pg3yhabbe4

  • MD5

    c416df61c2d1b3d75fa5983e282542ce

  • SHA1

    e1a98256b16e7a1666871133091743ee11e4a171

  • SHA256

    4a6cc991136caa150891fc6dea2eed91cc9c6b40030bee9120e1b8b504ab570e

  • SHA512

    ec0b63312f058e46b1106731a87aca84ffe196b4c88c433df7399611fc51a07518cc77c21764d289eb81a13b095c1505e1685591335103818916f33beba82c77

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

gay

C2

2.tcp.eu.ngrok.io:11696

Mutex

b40c8069f7901ea328823f37ffd1b3b2

Attributes
  • reg_key

    b40c8069f7901ea328823f37ffd1b3b2

  • splitter

    |'|'|

Extracted

Family

njrat

Version

im523

Botnet

NEXT

C2

109.197.196.135:9991

Mutex

413491cbe232876548b9b7cd8a1b451d

Attributes
  • reg_key

    413491cbe232876548b9b7cd8a1b451d

  • splitter

    |'|'|

Targets

    • Target

      0x000b000000003c9f-55.dat

    • Size

      37KB

    • MD5

      c416df61c2d1b3d75fa5983e282542ce

    • SHA1

      e1a98256b16e7a1666871133091743ee11e4a171

    • SHA256

      4a6cc991136caa150891fc6dea2eed91cc9c6b40030bee9120e1b8b504ab570e

    • SHA512

      ec0b63312f058e46b1106731a87aca84ffe196b4c88c433df7399611fc51a07518cc77c21764d289eb81a13b095c1505e1685591335103818916f33beba82c77

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

      suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

2
T1060

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks