General

  • Target

    607736aaaa0c9359fdaceb20ca9ece52d52e108b6592b4d8e7f49a6ca0bf28a9

  • Size

    1.1MB

  • Sample

    220731-e63c6aged7

  • MD5

    58b70dc435e70d62b6a0d4ed80c13b3b

  • SHA1

    62215c17f29509df0ed5992f71072e7ba787423c

  • SHA256

    607736aaaa0c9359fdaceb20ca9ece52d52e108b6592b4d8e7f49a6ca0bf28a9

  • SHA512

    6b1e05d9b24d26b1efd96e59f7615fb9a7bf2bbf26b17c626174de00d73852634bceaa4a484687c1b568bc264e76e1b661542728f451e01154f36c14dfb38714

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

188.164.251.215:1800

Mutex

ea23cb1a51efb6050b655e959a876166

Attributes
  • reg_key

    ea23cb1a51efb6050b655e959a876166

  • splitter

    |'|'|

Targets

    • Target

      607736aaaa0c9359fdaceb20ca9ece52d52e108b6592b4d8e7f49a6ca0bf28a9

    • Size

      1.1MB

    • MD5

      58b70dc435e70d62b6a0d4ed80c13b3b

    • SHA1

      62215c17f29509df0ed5992f71072e7ba787423c

    • SHA256

      607736aaaa0c9359fdaceb20ca9ece52d52e108b6592b4d8e7f49a6ca0bf28a9

    • SHA512

      6b1e05d9b24d26b1efd96e59f7615fb9a7bf2bbf26b17c626174de00d73852634bceaa4a484687c1b568bc264e76e1b661542728f451e01154f36c14dfb38714

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks