General

  • Target

    3e361edc828ebc551573d3e28be3b295.exe

  • Size

    46KB

  • Sample

    221014-c2fbqachhj

  • MD5

    3e361edc828ebc551573d3e28be3b295

  • SHA1

    130f4c5de25056add49babfdb2593727b9983b80

  • SHA256

    4c0abcb1e8d0205bce6f78dfc47bdc65f5e9f27e4279547fc1149c17b4fbc3ab

  • SHA512

    0559d0f8ca7f860e301d265d63cef5f67a5c7a92e0fa99cecaf92a97f3780110fcebab7f8272505933517fb135142d54b3c113955d53b66be8e3188a769a5a73

  • SSDEEP

    384:FEnraio1n7S5pbpQyEfhqH0f3IYykxarAF+rMRTyN/0L+EcoinblneHQM3epzXpM:SnT3pLEfgH0AlkYrM+rMRa8NuiUtBA

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HAXPC

C2

enderop44-36084.portmap.host:36084

Mutex

3d331bcce43ca74aba3fe5b393e79935

Attributes
  • reg_key

    3d331bcce43ca74aba3fe5b393e79935

  • splitter

    |'|'|

Targets

    • Target

      3e361edc828ebc551573d3e28be3b295.exe

    • Size

      46KB

    • MD5

      3e361edc828ebc551573d3e28be3b295

    • SHA1

      130f4c5de25056add49babfdb2593727b9983b80

    • SHA256

      4c0abcb1e8d0205bce6f78dfc47bdc65f5e9f27e4279547fc1149c17b4fbc3ab

    • SHA512

      0559d0f8ca7f860e301d265d63cef5f67a5c7a92e0fa99cecaf92a97f3780110fcebab7f8272505933517fb135142d54b3c113955d53b66be8e3188a769a5a73

    • SSDEEP

      384:FEnraio1n7S5pbpQyEfhqH0f3IYykxarAF+rMRTyN/0L+EcoinblneHQM3epzXpM:SnT3pLEfgH0AlkYrM+rMRa8NuiUtBA

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks