General

  • Target

    1aee4cb6eb57beb29dcc92bcf428c65e738853d0fcdb743ee7c1dcbdb7a30d5d

  • Size

    32KB

  • Sample

    221001-2zpvtabag9

  • MD5

    617aa95d1ac71a7e495ad546d8ce6820

  • SHA1

    a6f61730ca9905c4e57266251e43d5a5e7c63023

  • SHA256

    1aee4cb6eb57beb29dcc92bcf428c65e738853d0fcdb743ee7c1dcbdb7a30d5d

  • SHA512

    695ea4785bf8cab4fedaf88062ee1cbecea1dc83fd8baff52a38bc85e30d0527cb3420f3da1b187cce624b9b8fbf25accbb0d351e297bfea48e86407ddfc0fef

  • SSDEEP

    384:asqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZc8hKDVKF:FSoQA6mlcrRpcnu6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

mstafamahmood94.no-ip.biz:1177

Mutex

0b11416dfc53b136697bff551291eed9

Attributes
  • reg_key

    0b11416dfc53b136697bff551291eed9

  • splitter

    |'|'|

Targets

    • Target

      1aee4cb6eb57beb29dcc92bcf428c65e738853d0fcdb743ee7c1dcbdb7a30d5d

    • Size

      32KB

    • MD5

      617aa95d1ac71a7e495ad546d8ce6820

    • SHA1

      a6f61730ca9905c4e57266251e43d5a5e7c63023

    • SHA256

      1aee4cb6eb57beb29dcc92bcf428c65e738853d0fcdb743ee7c1dcbdb7a30d5d

    • SHA512

      695ea4785bf8cab4fedaf88062ee1cbecea1dc83fd8baff52a38bc85e30d0527cb3420f3da1b187cce624b9b8fbf25accbb0d351e297bfea48e86407ddfc0fef

    • SSDEEP

      384:asqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZc8hKDVKF:FSoQA6mlcrRpcnu6

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks