General

  • Target

    60592be138b3cadecfacb31c2ecffad95a20030adae364f4dafb9932d56dd572

  • Size

    29KB

  • Sample

    221002-k3nngsgfc7

  • MD5

    70403e78e612e435c81f467218ab19c0

  • SHA1

    ec2408407bb925b36adf3372d83480fc67bf4986

  • SHA256

    60592be138b3cadecfacb31c2ecffad95a20030adae364f4dafb9932d56dd572

  • SHA512

    04fc7c62b73d26c0558592c86975e3a3eeb9fb122f13a40987bbe36470cc0002863048ea216eba0b736fd667a8730cbf0295e7895f2a36649c27d0db7e0e8a20

  • SSDEEP

    384:h9gJGJl7tj1Msagab1h5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGOf:ht7nMsanzR+2cqEDveyBKh0p29SgR4w

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

ahmed12300.no-ip.biz:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      60592be138b3cadecfacb31c2ecffad95a20030adae364f4dafb9932d56dd572

    • Size

      29KB

    • MD5

      70403e78e612e435c81f467218ab19c0

    • SHA1

      ec2408407bb925b36adf3372d83480fc67bf4986

    • SHA256

      60592be138b3cadecfacb31c2ecffad95a20030adae364f4dafb9932d56dd572

    • SHA512

      04fc7c62b73d26c0558592c86975e3a3eeb9fb122f13a40987bbe36470cc0002863048ea216eba0b736fd667a8730cbf0295e7895f2a36649c27d0db7e0e8a20

    • SSDEEP

      384:h9gJGJl7tj1Msagab1h5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGOf:ht7nMsanzR+2cqEDveyBKh0p29SgR4w

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks