General

  • Target

    073869f6916ea44677e40d5186bda961.exe

  • Size

    37KB

  • Sample

    220923-klfljsgcb2

  • MD5

    073869f6916ea44677e40d5186bda961

  • SHA1

    f383b64329fd19115ad8587e8a9154cf1093ab3b

  • SHA256

    af8ac614d751b198b1fd00e75a99741d9190520dbd7825a395443354d8c8cc1a

  • SHA512

    01719f7c9569ad371c0ad197310acab7e6d670d20c868e018fb031ced840d3ab0e2828b908821740123949fe681a5664f0e49d48c05168d562af83665561a9b8

  • SSDEEP

    384:gFBZkitgZf5W9cTYXyc/SKlMA+zfzQnssItSrAF+rMRTyN/0L+EcoinblneHQM3K:2ByjjTYic/SKq8ssIErM+rMRa8Nujrt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:11814

Mutex

556f30eecd77380f1e650174143e5dec

Attributes
  • reg_key

    556f30eecd77380f1e650174143e5dec

  • splitter

    |'|'|

Targets

    • Target

      073869f6916ea44677e40d5186bda961.exe

    • Size

      37KB

    • MD5

      073869f6916ea44677e40d5186bda961

    • SHA1

      f383b64329fd19115ad8587e8a9154cf1093ab3b

    • SHA256

      af8ac614d751b198b1fd00e75a99741d9190520dbd7825a395443354d8c8cc1a

    • SHA512

      01719f7c9569ad371c0ad197310acab7e6d670d20c868e018fb031ced840d3ab0e2828b908821740123949fe681a5664f0e49d48c05168d562af83665561a9b8

    • SSDEEP

      384:gFBZkitgZf5W9cTYXyc/SKlMA+zfzQnssItSrAF+rMRTyN/0L+EcoinblneHQM3K:2ByjjTYic/SKq8ssIErM+rMRa8Nujrt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks