General

  • Target

    5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308

  • Size

    23KB

  • Sample

    221003-blejtabgbj

  • MD5

    45f7e1208e96bfb0ab850da7a80026a0

  • SHA1

    30837abde559e5b4c856c437a28b96e7162f4321

  • SHA256

    5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308

  • SHA512

    0eb5a7f6b757397ebda8279075a36e769306e59b60b79e74d927adc169b9b4b0d2e9b47c48cf7f8d46eb223f4750d2b9e650d947710564ab334961f7ac309494

  • SSDEEP

    384:68aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kN:9Xcwt3tRpcnuJI

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308

    • Size

      23KB

    • MD5

      45f7e1208e96bfb0ab850da7a80026a0

    • SHA1

      30837abde559e5b4c856c437a28b96e7162f4321

    • SHA256

      5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308

    • SHA512

      0eb5a7f6b757397ebda8279075a36e769306e59b60b79e74d927adc169b9b4b0d2e9b47c48cf7f8d46eb223f4750d2b9e650d947710564ab334961f7ac309494

    • SSDEEP

      384:68aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kN:9Xcwt3tRpcnuJI

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks