General

  • Target

    d562389df672af8ad2695e08fc44e6895110f629de3464587ec8289375038a80

  • Size

    24KB

  • Sample

    221013-va3xtadgaj

  • MD5

    65f4a96297b370caea9d1ccdd31e2270

  • SHA1

    94c2f59f019840ede04857317648410a57cf10ea

  • SHA256

    d562389df672af8ad2695e08fc44e6895110f629de3464587ec8289375038a80

  • SHA512

    8115e2462741c82213827b36b37568b8aec912d4cadb0455b7635a3ac71baca7178b612214f1ca9e1cb029b3c5dbdbbcec89ebeba99b3ab4f99f3f3b4b14d4a2

  • SSDEEP

    384:8sqSefmxpDQcx2cSusSUtL+06jgFACcyMZZjvRmRvR6JZlbw8hqIusZzZ9t:DVhL1sSFPyqgRpcnuE

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

xXx

C2

127.0.0.1:9200

Mutex

aea8f84570c5d2216045d7b2ed936eb3

Attributes
  • reg_key

    aea8f84570c5d2216045d7b2ed936eb3

  • splitter

    |'|'|

Targets

    • Target

      d562389df672af8ad2695e08fc44e6895110f629de3464587ec8289375038a80

    • Size

      24KB

    • MD5

      65f4a96297b370caea9d1ccdd31e2270

    • SHA1

      94c2f59f019840ede04857317648410a57cf10ea

    • SHA256

      d562389df672af8ad2695e08fc44e6895110f629de3464587ec8289375038a80

    • SHA512

      8115e2462741c82213827b36b37568b8aec912d4cadb0455b7635a3ac71baca7178b612214f1ca9e1cb029b3c5dbdbbcec89ebeba99b3ab4f99f3f3b4b14d4a2

    • SSDEEP

      384:8sqSefmxpDQcx2cSusSUtL+06jgFACcyMZZjvRmRvR6JZlbw8hqIusZzZ9t:DVhL1sSFPyqgRpcnuE

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks