General

  • Target

    138851849d5585aa75023fc00340be2ba7c14623329705c2fb9e81f746b3af4e

  • Size

    90KB

  • Sample

    221001-21nn5scdan

  • MD5

    6e294fcc1cd9475d14bbcb752a1c2a00

  • SHA1

    e837a35ed5fb77b85b613ed6f9d51181f0dbe370

  • SHA256

    138851849d5585aa75023fc00340be2ba7c14623329705c2fb9e81f746b3af4e

  • SHA512

    5d6f4103f997212432a138f1db45701c673ed9a0e5619136f504cdb4c3f1e7c5fc50373532685877368ce29f50755594ece4cae6a062938b1d8dfb261e4768ea

  • SSDEEP

    1536:j/EOtUMnDUi8Tw/pmcqQxPHdQN543awuCIcv1kV7E0yWgx6k+xxg:jVtznD0c/EQFaQKrceV7EXqBxxg

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

qquuali.ddns.net:1177

Mutex

337410fe1de3aa7d2d73b9cb00bd0f85

Attributes
  • reg_key

    337410fe1de3aa7d2d73b9cb00bd0f85

  • splitter

    |'|'|

Targets

    • Target

      138851849d5585aa75023fc00340be2ba7c14623329705c2fb9e81f746b3af4e

    • Size

      90KB

    • MD5

      6e294fcc1cd9475d14bbcb752a1c2a00

    • SHA1

      e837a35ed5fb77b85b613ed6f9d51181f0dbe370

    • SHA256

      138851849d5585aa75023fc00340be2ba7c14623329705c2fb9e81f746b3af4e

    • SHA512

      5d6f4103f997212432a138f1db45701c673ed9a0e5619136f504cdb4c3f1e7c5fc50373532685877368ce29f50755594ece4cae6a062938b1d8dfb261e4768ea

    • SSDEEP

      1536:j/EOtUMnDUi8Tw/pmcqQxPHdQN543awuCIcv1kV7E0yWgx6k+xxg:jVtznD0c/EQFaQKrceV7EXqBxxg

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks