General

  • Target

    87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960

  • Size

    108KB

  • Sample

    221003-cdm2nadaaj

  • MD5

    6c1ee36aacf5079d4d537ebd2fc5f148

  • SHA1

    5325df501e2bccd44c262445e8015ea6dd9de647

  • SHA256

    87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960

  • SHA512

    1d0386f239beae85e850fd7adeccf6bf709ae3647aeaa0dcfc8cd00d2d6464eaa3a029c1451cc9b29f2e1acfcee8415f18c287bf3e84d7f366872a2c8436f8d4

  • SSDEEP

    1536:WbnRoHJT3p+KADy00wJk2/uJOo/Yl2v0Som2hsDQwBTyYqjPvZO4w4:WbRopDpuz/ucoglG+fSDPQYqjPQ4w4

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

funkymalware.zapto.org:1177

Mutex

468488565f27c01a98cb0ac6112a97d0

Attributes
  • reg_key

    468488565f27c01a98cb0ac6112a97d0

  • splitter

    |'|'|

Targets

    • Target

      87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960

    • Size

      108KB

    • MD5

      6c1ee36aacf5079d4d537ebd2fc5f148

    • SHA1

      5325df501e2bccd44c262445e8015ea6dd9de647

    • SHA256

      87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960

    • SHA512

      1d0386f239beae85e850fd7adeccf6bf709ae3647aeaa0dcfc8cd00d2d6464eaa3a029c1451cc9b29f2e1acfcee8415f18c287bf3e84d7f366872a2c8436f8d4

    • SSDEEP

      1536:WbnRoHJT3p+KADy00wJk2/uJOo/Yl2v0Som2hsDQwBTyYqjPvZO4w4:WbRopDpuz/ucoglG+fSDPQYqjPQ4w4

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks