General

  • Target

    JaySoy.bin

  • Size

    93KB

  • Sample

    220706-fwzpysbah2

  • MD5

    e1bb8ea28a8d53fd209d1262e239397a

  • SHA1

    b4dd3322073f8d51ea1d8cb0f7a2768b388f1fbc

  • SHA256

    ecb9c4919b6503f72bebaa118d23bcc09ce8430dae03b98b2b8e2eed206850ab

  • SHA512

    3f0221d33d78324f6aa7091a20afd1c6d210bf00462c0468d7ea952c7b60ec7dcddb743257cc1d3b5b407de93bf18c2d36ae964cd83cf3c5c09863db5648c77d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

JaySo

C2

NC50Y3AuZXUubmdyb2suaW8Strik:MTI5MDg=

Mutex

429c4d90923139137515b87f729f47b8

Attributes
  • reg_key

    429c4d90923139137515b87f729f47b8

  • splitter

    |'|'|

Targets

    • Target

      JaySoy.bin

    • Size

      93KB

    • MD5

      e1bb8ea28a8d53fd209d1262e239397a

    • SHA1

      b4dd3322073f8d51ea1d8cb0f7a2768b388f1fbc

    • SHA256

      ecb9c4919b6503f72bebaa118d23bcc09ce8430dae03b98b2b8e2eed206850ab

    • SHA512

      3f0221d33d78324f6aa7091a20afd1c6d210bf00462c0468d7ea952c7b60ec7dcddb743257cc1d3b5b407de93bf18c2d36ae964cd83cf3c5c09863db5648c77d

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks