General

  • Target

    4446e5802b8f2c80a7831169b68c5cfdd83f3b410ab81f5dbd848c134c9a82d1

  • Size

    29KB

  • Sample

    220707-yjes5abea7

  • MD5

    1f8d6d7493bfebb5c801997c0800d589

  • SHA1

    275c9c445673a7cb2dfe491268cc17ba7a138bb1

  • SHA256

    4446e5802b8f2c80a7831169b68c5cfdd83f3b410ab81f5dbd848c134c9a82d1

  • SHA512

    4102580b518d99d860bd19594f76b0cf82dad3be533f90118eb5b3fa6f0bc05a7d2ce46f973b99a6f5807dc08da0cca50febd10cb24c308d8d01949a80043c1c

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

facebook

C2

hakerbatna.ddns.net:1177

Mutex

55b3825ee39ada2fcddf7c7accbde69e

Attributes
  • reg_key

    55b3825ee39ada2fcddf7c7accbde69e

  • splitter

    |'|'|

Targets

    • Target

      4446e5802b8f2c80a7831169b68c5cfdd83f3b410ab81f5dbd848c134c9a82d1

    • Size

      29KB

    • MD5

      1f8d6d7493bfebb5c801997c0800d589

    • SHA1

      275c9c445673a7cb2dfe491268cc17ba7a138bb1

    • SHA256

      4446e5802b8f2c80a7831169b68c5cfdd83f3b410ab81f5dbd848c134c9a82d1

    • SHA512

      4102580b518d99d860bd19594f76b0cf82dad3be533f90118eb5b3fa6f0bc05a7d2ce46f973b99a6f5807dc08da0cca50febd10cb24c308d8d01949a80043c1c

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks