General

  • Target

    97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2

  • Size

    240KB

  • Sample

    221003-rbthzsabf8

  • MD5

    6a24d3a2c5eff925493a56cf4badfa40

  • SHA1

    d0ac8ce3991435ff4d08eaf214166534c7fedc04

  • SHA256

    97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2

  • SHA512

    fb6aa516f0f0f85c9f22f54ec0ab8c321bca299b0ee8acfa89267610accd83244d6e8f721f375644f3477d5f0be5bffbb2dc256038ef4b4c42a898dcc2f530d1

  • SSDEEP

    3072:bKXSOyTcwFIvP4/5PWCYzTwuq+O/20nfSyk:bUSOyT2C2Tcur

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

rawaz.no-ip.biz:1177

Mutex

e2938176ad4f8955a927d3a3225a361f

Attributes
  • reg_key

    e2938176ad4f8955a927d3a3225a361f

  • splitter

    |'|'|

Targets

    • Target

      97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2

    • Size

      240KB

    • MD5

      6a24d3a2c5eff925493a56cf4badfa40

    • SHA1

      d0ac8ce3991435ff4d08eaf214166534c7fedc04

    • SHA256

      97bc8df2edcb87a49e9dedc6ae7952699276031344d3ed97f06a56273fdcd5b2

    • SHA512

      fb6aa516f0f0f85c9f22f54ec0ab8c321bca299b0ee8acfa89267610accd83244d6e8f721f375644f3477d5f0be5bffbb2dc256038ef4b4c42a898dcc2f530d1

    • SSDEEP

      3072:bKXSOyTcwFIvP4/5PWCYzTwuq+O/20nfSyk:bUSOyT2C2Tcur

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Detected potential entity reuse from brand microsoft.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

4
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks