General

  • Target

    c6ab81fd77708eae16fef94c2f41305ac3ef844835c1f3ba98febfc8eb4f337e

  • Size

    56KB

  • Sample

    221003-a2jysshdb3

  • MD5

    639712e89c4a42bc2c755a0eb221b820

  • SHA1

    a14fa807b4a48c39778e7ed756334ec2d814acf4

  • SHA256

    c6ab81fd77708eae16fef94c2f41305ac3ef844835c1f3ba98febfc8eb4f337e

  • SHA512

    a9c87d2d300f8353e2af02abd380dae376297f297ad659c916f2a56195d6a0527b51a3ee9066783f795d634e2852ed7a92e623e14af685ebe38609b240b63a23

  • SSDEEP

    384:yCINl7rZt4AgSTnd5fGmjmumqD418+eYKGBsbh0w4wlAokw9OhgOL1vYRGOZzUZL:I7v4AgMdgmjAq8XeIBKh0p29SgRGL

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

mohamed-isper.ddns.net:1177

Mutex

c86dde540c78abe630dfe951b22ac3e0

Attributes
  • reg_key

    c86dde540c78abe630dfe951b22ac3e0

  • splitter

    |'|'|

Targets

    • Target

      c6ab81fd77708eae16fef94c2f41305ac3ef844835c1f3ba98febfc8eb4f337e

    • Size

      56KB

    • MD5

      639712e89c4a42bc2c755a0eb221b820

    • SHA1

      a14fa807b4a48c39778e7ed756334ec2d814acf4

    • SHA256

      c6ab81fd77708eae16fef94c2f41305ac3ef844835c1f3ba98febfc8eb4f337e

    • SHA512

      a9c87d2d300f8353e2af02abd380dae376297f297ad659c916f2a56195d6a0527b51a3ee9066783f795d634e2852ed7a92e623e14af685ebe38609b240b63a23

    • SSDEEP

      384:yCINl7rZt4AgSTnd5fGmjmumqD418+eYKGBsbh0w4wlAokw9OhgOL1vYRGOZzUZL:I7v4AgMdgmjAq8XeIBKh0p29SgRGL

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks