General

  • Target

    5e220b16575e55b589df04d15e2806160345f4d588bc659be5f3090919dd4be5

  • Size

    28KB

  • Sample

    220731-z6k44ahgfn

  • MD5

    09d9d38a61ca864ddca8c576b9a3526f

  • SHA1

    03df810dc2f1b2bfd240a6532cd36e0965fa8dc8

  • SHA256

    5e220b16575e55b589df04d15e2806160345f4d588bc659be5f3090919dd4be5

  • SHA512

    ab950d0ab1567f7dac126d275797c7be2ba3b017b5c2a2cf4361dc675bd62631f6e65c5e3a37ab1d01d24fbbf085777d46be2bfe447f5cf53ad7c9a7d87b7c5b

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

212683d986fb740ad6a40184df48e604

Attributes
  • reg_key

    212683d986fb740ad6a40184df48e604

  • splitter

    |'|'|

Targets

    • Target

      5e220b16575e55b589df04d15e2806160345f4d588bc659be5f3090919dd4be5

    • Size

      28KB

    • MD5

      09d9d38a61ca864ddca8c576b9a3526f

    • SHA1

      03df810dc2f1b2bfd240a6532cd36e0965fa8dc8

    • SHA256

      5e220b16575e55b589df04d15e2806160345f4d588bc659be5f3090919dd4be5

    • SHA512

      ab950d0ab1567f7dac126d275797c7be2ba3b017b5c2a2cf4361dc675bd62631f6e65c5e3a37ab1d01d24fbbf085777d46be2bfe447f5cf53ad7c9a7d87b7c5b

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks