General

  • Target

    ce5b81898e32170cee439915169e63a25e437fcc2adfdc38d6e89d0d38fbd0a5

  • Size

    24KB

  • Sample

    221004-bnqd4afcd9

  • MD5

    6d647691513dbf2105dc4801102fcd20

  • SHA1

    2779154a18d57e890b9f4c2f2fdf4fe348738ae4

  • SHA256

    ce5b81898e32170cee439915169e63a25e437fcc2adfdc38d6e89d0d38fbd0a5

  • SHA512

    2ce545b87a5c1133e609303e8d525a182096b0348a5ac393845297088ee2d2a5c6f9e5d609abcbd1533979c50bc69552087cf1263632ee48c35d02e0a1f577b4

  • SSDEEP

    384:e+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZkQ:Rm+71d5XRpcnuC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

anis76.no-ip.biz:5552

Mutex

e70c955ed65f219869acad6925dd571c

Attributes
  • reg_key

    e70c955ed65f219869acad6925dd571c

  • splitter

    |'|'|

Targets

    • Target

      ce5b81898e32170cee439915169e63a25e437fcc2adfdc38d6e89d0d38fbd0a5

    • Size

      24KB

    • MD5

      6d647691513dbf2105dc4801102fcd20

    • SHA1

      2779154a18d57e890b9f4c2f2fdf4fe348738ae4

    • SHA256

      ce5b81898e32170cee439915169e63a25e437fcc2adfdc38d6e89d0d38fbd0a5

    • SHA512

      2ce545b87a5c1133e609303e8d525a182096b0348a5ac393845297088ee2d2a5c6f9e5d609abcbd1533979c50bc69552087cf1263632ee48c35d02e0a1f577b4

    • SSDEEP

      384:e+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZkQ:Rm+71d5XRpcnuC

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks