General

  • Target

    c59c3e6a38af488ffc72f07f19f9be2b4615f1dbea13e4b090979a67beb465a3

  • Size

    29KB

  • Sample

    221003-qv56fshdg7

  • MD5

    5c19d19c5e8118099e93a65f62900520

  • SHA1

    d6bbd2957fb2650a58ec09c9c0c5418f66990115

  • SHA256

    c59c3e6a38af488ffc72f07f19f9be2b4615f1dbea13e4b090979a67beb465a3

  • SHA512

    fbf823f74d0ae57631316da5f2f6fb7c4415ff01c692c9fbdf0688529a4186fc1404f643c7cb90d7c0ca12f4f80cdf7eaca70a7d71fed13efac7d4617a3e3af0

  • SSDEEP

    384:uFUHEBl7p3hUw2s7bD55gEKRmqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzNr:u57bUw2C3kEBqNreHBKh0p29SgR/x

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

klawess1.no-ip.org:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      c59c3e6a38af488ffc72f07f19f9be2b4615f1dbea13e4b090979a67beb465a3

    • Size

      29KB

    • MD5

      5c19d19c5e8118099e93a65f62900520

    • SHA1

      d6bbd2957fb2650a58ec09c9c0c5418f66990115

    • SHA256

      c59c3e6a38af488ffc72f07f19f9be2b4615f1dbea13e4b090979a67beb465a3

    • SHA512

      fbf823f74d0ae57631316da5f2f6fb7c4415ff01c692c9fbdf0688529a4186fc1404f643c7cb90d7c0ca12f4f80cdf7eaca70a7d71fed13efac7d4617a3e3af0

    • SSDEEP

      384:uFUHEBl7p3hUw2s7bD55gEKRmqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzNr:u57bUw2C3kEBqNreHBKh0p29SgR/x

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks