General

  • Target

    1432-57-0x0000000001D80000-0x0000000001D8E000-memory.dmp

  • Size

    56KB

  • Sample

    220810-ngmqvabdd9

  • MD5

    0e5e5f527c0ef084e3e381445f37056f

  • SHA1

    1aa6ae381ae100bccc9de5ef875ca603c128aa48

  • SHA256

    3e4960b191ea98d8960024a200e6bb7b2d85b3adcba93b0a93bb127ebbc5a06a

  • SHA512

    b19748b3606270427cd97320cfd7bf026b8c7cfd10134f156405f25a0bb78f2b3b41efefd65c42a64faf1a9490705c2b6f34953b0818607e5861cba80dde1596

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

easralahtane.ddns.net:1177

Mutex

78c3f41e66e57697cb0f063c5b808ae6

Attributes
  • reg_key

    78c3f41e66e57697cb0f063c5b808ae6

  • splitter

    |'|'|

Targets

    • Target

      1432-57-0x0000000001D80000-0x0000000001D8E000-memory.dmp

    • Size

      56KB

    • MD5

      0e5e5f527c0ef084e3e381445f37056f

    • SHA1

      1aa6ae381ae100bccc9de5ef875ca603c128aa48

    • SHA256

      3e4960b191ea98d8960024a200e6bb7b2d85b3adcba93b0a93bb127ebbc5a06a

    • SHA512

      b19748b3606270427cd97320cfd7bf026b8c7cfd10134f156405f25a0bb78f2b3b41efefd65c42a64faf1a9490705c2b6f34953b0818607e5861cba80dde1596

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks