General

  • Target

    438e98b6196ec0e9207a27e2b18bfe76c99a63c1e2bed8db1482eeeaea88a00d

  • Size

    22KB

  • Sample

    220707-2ftpnagfb3

  • MD5

    97eebaae286dd77c78f2fa727b6b11df

  • SHA1

    4f1221c430dca2b619d3b5525de5e79efa91cca1

  • SHA256

    438e98b6196ec0e9207a27e2b18bfe76c99a63c1e2bed8db1482eeeaea88a00d

  • SHA512

    1d91e1494a10f68849d91d07c670d8892a5b30020cc642d558187f389db25cc9fbbf8b6c8f7c7e1f1a031567c303b20eda983e957e1ca002178ac543b38da77e

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Home

C2

njfree2play.cloudns.cc:8859

Mutex

f15e7256debf3109725ba841f67de129

Attributes
  • reg_key

    f15e7256debf3109725ba841f67de129

  • splitter

    |'|'|

Targets

    • Target

      438e98b6196ec0e9207a27e2b18bfe76c99a63c1e2bed8db1482eeeaea88a00d

    • Size

      22KB

    • MD5

      97eebaae286dd77c78f2fa727b6b11df

    • SHA1

      4f1221c430dca2b619d3b5525de5e79efa91cca1

    • SHA256

      438e98b6196ec0e9207a27e2b18bfe76c99a63c1e2bed8db1482eeeaea88a00d

    • SHA512

      1d91e1494a10f68849d91d07c670d8892a5b30020cc642d558187f389db25cc9fbbf8b6c8f7c7e1f1a031567c303b20eda983e957e1ca002178ac543b38da77e

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks