General

  • Target

    1965b0ccf648da54d5571e016fb771040de218b85ffa9a88f8d6265588bb5fdf

  • Size

    677KB

  • Sample

    221003-byp63sccdp

  • MD5

    6fe8d44d398005b74e89dfa194aa8a60

  • SHA1

    7732ef3b5c162f4737006865f8fa8a92c49a8826

  • SHA256

    1965b0ccf648da54d5571e016fb771040de218b85ffa9a88f8d6265588bb5fdf

  • SHA512

    d985975ac0b45778c3258d7ef2f0ada6241af742a29ca8d5bd1ce4c0b139ba150f4df775c8064326108a7e087818cd7e2e84b1a23ef40650bfec4ff6d5e93f11

  • SSDEEP

    12288:ph0tFZLexMG65AEMfuVQJ2TwMPBWhLP4tNrI9knsYzBWtAU3F/:3KZLexMGRJfuVQJ2T1PBKr4vRBsAUV

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Gerador de Cash

C2

skillhacking1.ddns.net:1177

Mutex

08f4dc96bbb7af09d1a37fe35c75a42f

Attributes
  • reg_key

    08f4dc96bbb7af09d1a37fe35c75a42f

  • splitter

    |'|'|

Targets

    • Target

      1965b0ccf648da54d5571e016fb771040de218b85ffa9a88f8d6265588bb5fdf

    • Size

      677KB

    • MD5

      6fe8d44d398005b74e89dfa194aa8a60

    • SHA1

      7732ef3b5c162f4737006865f8fa8a92c49a8826

    • SHA256

      1965b0ccf648da54d5571e016fb771040de218b85ffa9a88f8d6265588bb5fdf

    • SHA512

      d985975ac0b45778c3258d7ef2f0ada6241af742a29ca8d5bd1ce4c0b139ba150f4df775c8064326108a7e087818cd7e2e84b1a23ef40650bfec4ff6d5e93f11

    • SSDEEP

      12288:ph0tFZLexMG65AEMfuVQJ2TwMPBWhLP4tNrI9knsYzBWtAU3F/:3KZLexMGRJfuVQJ2T1PBKr4vRBsAUV

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks