General

  • Target

    HEUR-Trojan.MSIL.Gorgon.gen-4c9b1b4db3fd9b0cd.exe

  • Size

    275KB

  • Sample

    220913-scm82abffj

  • MD5

    23fa40a66b8c641f8324c2b659c341be

  • SHA1

    8eeea57eb2af7bb571f023b29d59202e97eaab59

  • SHA256

    4c9b1b4db3fd9b0cd9b7163cdbee3c321cd2046516f65443345d34eeaba05b05

  • SHA512

    ad47eb6357936125ebb8d10a1dea5c42357178fc0e7243adf50a4a9677fb78ca49912fae43d0a0f86cdc0c1215a43dd60f194f7ebcd5cea9ad438d8f5f8eea58

  • SSDEEP

    3072:UYH88y9uczJx44Dolo4fFSpTjP17qWyW3zbx2vyE7S1M2Q:Ply9uczJxRDolZgV1dnbkORQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

2.tcp.eu.ngrok.io:13002

Mutex

2806cdb1ef67986308064d5873a67ad7

Attributes
  • reg_key

    2806cdb1ef67986308064d5873a67ad7

  • splitter

    |'|'|

Targets

    • Target

      HEUR-Trojan.MSIL.Gorgon.gen-4c9b1b4db3fd9b0cd.exe

    • Size

      275KB

    • MD5

      23fa40a66b8c641f8324c2b659c341be

    • SHA1

      8eeea57eb2af7bb571f023b29d59202e97eaab59

    • SHA256

      4c9b1b4db3fd9b0cd9b7163cdbee3c321cd2046516f65443345d34eeaba05b05

    • SHA512

      ad47eb6357936125ebb8d10a1dea5c42357178fc0e7243adf50a4a9677fb78ca49912fae43d0a0f86cdc0c1215a43dd60f194f7ebcd5cea9ad438d8f5f8eea58

    • SSDEEP

      3072:UYH88y9uczJx44Dolo4fFSpTjP17qWyW3zbx2vyE7S1M2Q:Ply9uczJxRDolZgV1dnbkORQ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks