General

  • Target

    486a93bc98a58d3e88d4c491c15b1ab8f331efdf8206fa0e5d4f52754abf01e3

  • Size

    320KB

  • Sample

    221003-bptg5sbhcm

  • MD5

    67c17d16cda6cdabd9b3e4d5bd0f9a30

  • SHA1

    fe9d1dc96b44fae3cd06b4db3447f61bcc93262b

  • SHA256

    486a93bc98a58d3e88d4c491c15b1ab8f331efdf8206fa0e5d4f52754abf01e3

  • SHA512

    30525df3a7c45e93f77acebdfddc73bf01726725dd7f719f046c3502a002fc376e7c3c2d5db2774b151bdaa2b99549e0dbf96242d26e1ee7973678b9a3f26107

  • SSDEEP

    6144:PMOhqDDjBG3q28TKH3kdULeaSqVig4D033ziJztkIMao:PMO+PBA85tkIMa

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ahmedgaradi55.zapto.org:1177

Mutex

cd9343d50c47eda1c5088069633d7730

Attributes
  • reg_key

    cd9343d50c47eda1c5088069633d7730

  • splitter

    |'|'|

Targets

    • Target

      486a93bc98a58d3e88d4c491c15b1ab8f331efdf8206fa0e5d4f52754abf01e3

    • Size

      320KB

    • MD5

      67c17d16cda6cdabd9b3e4d5bd0f9a30

    • SHA1

      fe9d1dc96b44fae3cd06b4db3447f61bcc93262b

    • SHA256

      486a93bc98a58d3e88d4c491c15b1ab8f331efdf8206fa0e5d4f52754abf01e3

    • SHA512

      30525df3a7c45e93f77acebdfddc73bf01726725dd7f719f046c3502a002fc376e7c3c2d5db2774b151bdaa2b99549e0dbf96242d26e1ee7973678b9a3f26107

    • SSDEEP

      6144:PMOhqDDjBG3q28TKH3kdULeaSqVig4D033ziJztkIMao:PMO+PBA85tkIMa

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks