General

  • Target

    a5c8c30adea3c6efedd695ec00d47f8e774b64118daf02d65c302dd2e345202f

  • Size

    201KB

  • Sample

    221002-2n2egadhc4

  • MD5

    4486cc9afaf3f56305be44af02461af0

  • SHA1

    0542ac159f8c20eba9569029370fdead2aad685c

  • SHA256

    a5c8c30adea3c6efedd695ec00d47f8e774b64118daf02d65c302dd2e345202f

  • SHA512

    d90d06371521df0383babd6d48bc66d7000cf9b26301ed5ce9e046bd9a835307988caddf7e6f5ef9f763f570a72a086177dd07c3ecc29f7efe986d5f80ff978b

  • SSDEEP

    3072:maxc0mb5WGqSRaCXipPFOJ/87V5Ll/j2AerJYJW:AbsGqSRaWqPFO587V5Ll/yxJ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

anonym0z.ddns.net:4343

Mutex

17d58b9ed643440f8e6ebd8a10b2f3f7

Attributes
  • reg_key

    17d58b9ed643440f8e6ebd8a10b2f3f7

  • splitter

    |'|'|

Targets

    • Target

      a5c8c30adea3c6efedd695ec00d47f8e774b64118daf02d65c302dd2e345202f

    • Size

      201KB

    • MD5

      4486cc9afaf3f56305be44af02461af0

    • SHA1

      0542ac159f8c20eba9569029370fdead2aad685c

    • SHA256

      a5c8c30adea3c6efedd695ec00d47f8e774b64118daf02d65c302dd2e345202f

    • SHA512

      d90d06371521df0383babd6d48bc66d7000cf9b26301ed5ce9e046bd9a835307988caddf7e6f5ef9f763f570a72a086177dd07c3ecc29f7efe986d5f80ff978b

    • SSDEEP

      3072:maxc0mb5WGqSRaCXipPFOJ/87V5Ll/j2AerJYJW:AbsGqSRaWqPFO587V5Ll/yxJ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks