General

  • Target

    1668-55-0x0000000000230000-0x000000000023C000-memory.dmp

  • Size

    48KB

  • Sample

    220821-v3s83sfbc2

  • MD5

    5650fb6db808b5fe9348437b87da9c57

  • SHA1

    d86e3f3d82bfc2708e00ac3a1dd397c576dd6f73

  • SHA256

    d4dfce7023f3b7a52efab1b444e051160460b286d3be25ca6caeb1cb272f42dc

  • SHA512

    ceac0986889c3e213a55ed040339e6e21885e79055d23dd1d7f6b9ed241b25ccd51c769a814444e58f6e7ee3cfd00172bb68043ef92d7c81acb65e60416f4eae

  • SSDEEP

    384:N+4Q+SAN7uprgvM5OSUswZXg69gbm4hfpFmRvR6JZlbw8hqIusZzZZT:N8OaxVULRpcnuG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

easralahtane.ddns.net:3973

Mutex

d2affd0990860fff6a059dbd50f93a64

Attributes
  • reg_key

    d2affd0990860fff6a059dbd50f93a64

  • splitter

    |'|'|

Targets

    • Target

      1668-55-0x0000000000230000-0x000000000023C000-memory.dmp

    • Size

      48KB

    • MD5

      5650fb6db808b5fe9348437b87da9c57

    • SHA1

      d86e3f3d82bfc2708e00ac3a1dd397c576dd6f73

    • SHA256

      d4dfce7023f3b7a52efab1b444e051160460b286d3be25ca6caeb1cb272f42dc

    • SHA512

      ceac0986889c3e213a55ed040339e6e21885e79055d23dd1d7f6b9ed241b25ccd51c769a814444e58f6e7ee3cfd00172bb68043ef92d7c81acb65e60416f4eae

    • SSDEEP

      384:N+4Q+SAN7uprgvM5OSUswZXg69gbm4hfpFmRvR6JZlbw8hqIusZzZZT:N8OaxVULRpcnuG

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks