General

  • Target

    FA536D889AFFB81391EE202980D417E82CEE0B46D97DA.exe

  • Size

    93KB

  • Sample

    220919-pclhnacacj

  • MD5

    cd49dea59efe62d7288c76280c38f134

  • SHA1

    35097c84b9dad414b72022eb368ccb0e4be5563d

  • SHA256

    fa536d889affb81391ee202980d417e82cee0b46d97da4070b4a4e2052d33d82

  • SHA512

    4ba0d5686108ef423fa2b841c1a3e3def225a0fb1165885e66c7ae5d8422b998fd89338d7eefb51cf752a9dbca6d869146973d0a131d71a09c4b9da40e10e1b7

  • SSDEEP

    768:oY3gub30YTXspgM0m2zGjpyDtdXWuhtXYLWhyXxrjEtCdnl2pi1Rz4Rk3HsGdpz3:wuT0AA0mT1mrWxL5jEwzGi1dDTDzgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

FRANSESCOC50Y3AuZXUubmdyb2suaW8Strik:MTY4NzI=

Mutex

ef9410a92d1077d89c94b9208aa74f96

Attributes
  • reg_key

    ef9410a92d1077d89c94b9208aa74f96

  • splitter

    |'|'|

Targets

    • Target

      FA536D889AFFB81391EE202980D417E82CEE0B46D97DA.exe

    • Size

      93KB

    • MD5

      cd49dea59efe62d7288c76280c38f134

    • SHA1

      35097c84b9dad414b72022eb368ccb0e4be5563d

    • SHA256

      fa536d889affb81391ee202980d417e82cee0b46d97da4070b4a4e2052d33d82

    • SHA512

      4ba0d5686108ef423fa2b841c1a3e3def225a0fb1165885e66c7ae5d8422b998fd89338d7eefb51cf752a9dbca6d869146973d0a131d71a09c4b9da40e10e1b7

    • SSDEEP

      768:oY3gub30YTXspgM0m2zGjpyDtdXWuhtXYLWhyXxrjEtCdnl2pi1Rz4Rk3HsGdpz3:wuT0AA0mT1mrWxL5jEwzGi1dDTDzgS

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks