General

  • Target

    d6e84941ce5d258a635374d5d3a35b7b50f920c9da6d2804c3469e2681c9a525

  • Size

    576KB

  • Sample

    221003-cdfbtachhm

  • MD5

    371a9e97a6c1a198db1735eadd2ddde0

  • SHA1

    3fc4f4b63e43d9219168ff80855242c68c8308c4

  • SHA256

    d6e84941ce5d258a635374d5d3a35b7b50f920c9da6d2804c3469e2681c9a525

  • SHA512

    f717b3c86a659921cb0a64144928f41cf975f0510a43bf4f416cf24a1d57926e77fd7244fb684ace2f8af3f9ca59646de7bbba8b7b2647d37943703a5e6a1a97

  • SSDEEP

    12288:o1NbHByjm6KffQjrkQR8Lx1ahP+dmyyGlcWH:sbHgjmYj4QSLLaN+dmyyGL

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Szwaby

C2

scamher.chickenkiller.com:55554

Mutex

0391c958660a9aa52aecefa0d373bda0

Attributes
  • reg_key

    0391c958660a9aa52aecefa0d373bda0

  • splitter

    |'|'|

Targets

    • Target

      d6e84941ce5d258a635374d5d3a35b7b50f920c9da6d2804c3469e2681c9a525

    • Size

      576KB

    • MD5

      371a9e97a6c1a198db1735eadd2ddde0

    • SHA1

      3fc4f4b63e43d9219168ff80855242c68c8308c4

    • SHA256

      d6e84941ce5d258a635374d5d3a35b7b50f920c9da6d2804c3469e2681c9a525

    • SHA512

      f717b3c86a659921cb0a64144928f41cf975f0510a43bf4f416cf24a1d57926e77fd7244fb684ace2f8af3f9ca59646de7bbba8b7b2647d37943703a5e6a1a97

    • SSDEEP

      12288:o1NbHByjm6KffQjrkQR8Lx1ahP+dmyyGlcWH:sbHgjmYj4QSLLaN+dmyyGL

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks