General

  • Target

    74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe

  • Size

    572KB

  • Sample

    221002-zz1wzaagh2

  • MD5

    3c62f18b9cc44d48e2187bf66d9fae04

  • SHA1

    7010bf5ae66555b4891eb32b9e7b1e2ab603bf8b

  • SHA256

    74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8

  • SHA512

    2f82f30fbfe30b2be09538e9c0c465aa9fd71135e42cd9103b56a1ed4dbabcf1347475aa78277d7b87ade5c217e20f39896466cd3309010a81208015d1b028d6

  • SSDEEP

    12288:hToPWBv/cpGrU3yXoT77F1KQSSOS14Gr59aAqg4/G:hTbBv5rUfFnSST14GrfAR/G

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

FRANSESCOTQ3LjE4NS4yFRANSESCOjEuFRANSESCOjEx:MjAxMTE=

Mutex

15c02f637abec4a65e1044f0fcf0abcc

Attributes
  • reg_key

    15c02f637abec4a65e1044f0fcf0abcc

  • splitter

    |'|'|

Targets

    • Target

      74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe

    • Size

      572KB

    • MD5

      3c62f18b9cc44d48e2187bf66d9fae04

    • SHA1

      7010bf5ae66555b4891eb32b9e7b1e2ab603bf8b

    • SHA256

      74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8

    • SHA512

      2f82f30fbfe30b2be09538e9c0c465aa9fd71135e42cd9103b56a1ed4dbabcf1347475aa78277d7b87ade5c217e20f39896466cd3309010a81208015d1b028d6

    • SSDEEP

      12288:hToPWBv/cpGrU3yXoT77F1KQSSOS14Gr59aAqg4/G:hTbBv5rUfFnSST14GrfAR/G

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks