General

  • Target

    8aa90e17d6ee6459431eece20713f1147ba4376837bb6b8c8fe2b626603a8261

  • Size

    41KB

  • Sample

    221004-b5p5nagad3

  • MD5

    3b6dcc4033df192ce93217781eb6f5d1

  • SHA1

    73c827b8b4165ce488bc8510c8001879212cc227

  • SHA256

    8aa90e17d6ee6459431eece20713f1147ba4376837bb6b8c8fe2b626603a8261

  • SHA512

    3f3a0a5469a71a4ea01655460b642ae8db992c987a48909b0b591cc3ff10592b4e02e36ad7bb3e6a4e8aaa19019ddda2aefd8183753e126c3b8071ed68e45bd3

  • SSDEEP

    768:nTr8pt0HjgPzlIojYQqPaGhEiAxyZZyyWzbW97PMMtkgbl:nTQ9ZIMqiGhbqH+r/28

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed2

C2

pet105.no-ip.biz:9000

Mutex

6fccb10a7752f3a889e069a3101937a6

Attributes
  • reg_key

    6fccb10a7752f3a889e069a3101937a6

  • splitter

    |'|'|

Targets

    • Target

      8aa90e17d6ee6459431eece20713f1147ba4376837bb6b8c8fe2b626603a8261

    • Size

      41KB

    • MD5

      3b6dcc4033df192ce93217781eb6f5d1

    • SHA1

      73c827b8b4165ce488bc8510c8001879212cc227

    • SHA256

      8aa90e17d6ee6459431eece20713f1147ba4376837bb6b8c8fe2b626603a8261

    • SHA512

      3f3a0a5469a71a4ea01655460b642ae8db992c987a48909b0b591cc3ff10592b4e02e36ad7bb3e6a4e8aaa19019ddda2aefd8183753e126c3b8071ed68e45bd3

    • SSDEEP

      768:nTr8pt0HjgPzlIojYQqPaGhEiAxyZZyyWzbW97PMMtkgbl:nTQ9ZIMqiGhbqH+r/28

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks