General

  • Target

    60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030

  • Size

    23KB

  • Sample

    220730-2s34vsbga3

  • MD5

    b689fb71432554182bb97c56a696a2c7

  • SHA1

    a87ebc1f17508f35439d019163efd89f4ec16464

  • SHA256

    60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030

  • SHA512

    f67b55bc4214849a23be04cdfa8cfef4bf30e3ed0d6d36de7961ef61977815861cf949346d279aa07babec0a256ab503e6b05fd490bb7af51c0e04bffb08c701

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

wlkjdaui828.ddns.net:1177

Mutex

2699e520cbd4295cbb0dda2cd9d08c81

Attributes
  • reg_key

    2699e520cbd4295cbb0dda2cd9d08c81

  • splitter

    |'|'|

Targets

    • Target

      60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030

    • Size

      23KB

    • MD5

      b689fb71432554182bb97c56a696a2c7

    • SHA1

      a87ebc1f17508f35439d019163efd89f4ec16464

    • SHA256

      60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030

    • SHA512

      f67b55bc4214849a23be04cdfa8cfef4bf30e3ed0d6d36de7961ef61977815861cf949346d279aa07babec0a256ab503e6b05fd490bb7af51c0e04bffb08c701

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks