General

  • Target

    2ead13296e90b2e3683fd3a219857a61c20edc17e7714392a94ba4a13a042164

  • Size

    23KB

  • Sample

    221001-2wjvdscbar

  • MD5

    575adc1e4c148afe397d3695759ce440

  • SHA1

    0b41160e2743facbdd73dbaafaee41a2785fa798

  • SHA256

    2ead13296e90b2e3683fd3a219857a61c20edc17e7714392a94ba4a13a042164

  • SHA512

    69203ebab522c44c4bac83a8a1a01c3054000729fd2d925a7f6d54c7f3fd002623739acbda0a722d18a10011f102c19a44f193a73f3b68e269243a89012d29a0

  • SSDEEP

    384:XoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMj:w7O89p2rRpcnup

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

hacked

C2

momodz.no-ip.biz:1177

Mutex

a1fe58e271392148d9447041084cdb09

Attributes
  • reg_key

    a1fe58e271392148d9447041084cdb09

  • splitter

    |'|'|

Targets

    • Target

      2ead13296e90b2e3683fd3a219857a61c20edc17e7714392a94ba4a13a042164

    • Size

      23KB

    • MD5

      575adc1e4c148afe397d3695759ce440

    • SHA1

      0b41160e2743facbdd73dbaafaee41a2785fa798

    • SHA256

      2ead13296e90b2e3683fd3a219857a61c20edc17e7714392a94ba4a13a042164

    • SHA512

      69203ebab522c44c4bac83a8a1a01c3054000729fd2d925a7f6d54c7f3fd002623739acbda0a722d18a10011f102c19a44f193a73f3b68e269243a89012d29a0

    • SSDEEP

      384:XoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMj:w7O89p2rRpcnup

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks