General

  • Target

    1b240fbee5ebdf445d2aba341b8f293532999749e81051e8a640a2410e0621ff

  • Size

    23KB

  • Sample

    221002-2n383afchj

  • MD5

    04c9579ee85f3b2fabf620303fa9cc90

  • SHA1

    48df4bc72ad26aef1e3fadac7c6ddd6ca626abce

  • SHA256

    1b240fbee5ebdf445d2aba341b8f293532999749e81051e8a640a2410e0621ff

  • SHA512

    193417d0e28f96a09ae3224646d2b1ff11130d89e4a26860d6a16e4bf199718ecb7b6a3669094298e01e64b770c72118108fb75ee61a18a458a60e978c830621

  • SSDEEP

    384:xY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZ2q:GL2s+tRyRpcnuS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

fighttodie.no-ip.biz:5552

Mutex

72126f8572f3282b2c6268c6e259a902

Attributes
  • reg_key

    72126f8572f3282b2c6268c6e259a902

  • splitter

    |'|'|

Targets

    • Target

      1b240fbee5ebdf445d2aba341b8f293532999749e81051e8a640a2410e0621ff

    • Size

      23KB

    • MD5

      04c9579ee85f3b2fabf620303fa9cc90

    • SHA1

      48df4bc72ad26aef1e3fadac7c6ddd6ca626abce

    • SHA256

      1b240fbee5ebdf445d2aba341b8f293532999749e81051e8a640a2410e0621ff

    • SHA512

      193417d0e28f96a09ae3224646d2b1ff11130d89e4a26860d6a16e4bf199718ecb7b6a3669094298e01e64b770c72118108fb75ee61a18a458a60e978c830621

    • SSDEEP

      384:xY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZ2q:GL2s+tRyRpcnuS

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks