General

  • Target

    animalhaha.exe

  • Size

    27KB

  • Sample

    220808-nnvp2accf2

  • MD5

    f24251c4a9bc8f5613026d85ac28dbab

  • SHA1

    9eb4b74cee39a1f44241b449fc872710f884924f

  • SHA256

    ba75eac69192e61b4479bc36eac36b4f127298f6b4763a7f4ade06f085c980ac

  • SHA512

    b5a1e69fff362cd2863c38b914a3145948aeb33838d3a419ac9f26abf269ac26023541a28c9e2038b94248467cec82063e078d27109d0600fdc29b2c695d32ca

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

194.5.98.188:4003

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      animalhaha.exe

    • Size

      27KB

    • MD5

      f24251c4a9bc8f5613026d85ac28dbab

    • SHA1

      9eb4b74cee39a1f44241b449fc872710f884924f

    • SHA256

      ba75eac69192e61b4479bc36eac36b4f127298f6b4763a7f4ade06f085c980ac

    • SHA512

      b5a1e69fff362cd2863c38b914a3145948aeb33838d3a419ac9f26abf269ac26023541a28c9e2038b94248467cec82063e078d27109d0600fdc29b2c695d32ca

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks