General

  • Target

    3889a48fdee124bf502e54d3ce5ed8ff6f2049b2ac426be85d68c7b691680e4b

  • Size

    392KB

  • Sample

    221020-gtht4aghh3

  • MD5

    7578da21c9c615e0c81f44c197375780

  • SHA1

    14e26a0792bfe3660be457a2dab3c1caf83306d9

  • SHA256

    3889a48fdee124bf502e54d3ce5ed8ff6f2049b2ac426be85d68c7b691680e4b

  • SHA512

    a52db33f938d5b79cbd9897a523894848ac4f5e49f060cc0a34cf0eb278418558d1f5d7115203fb5ebc24b81f5dd9a40934a95890adfe0a9b18a30a25f009e2a

  • SSDEEP

    6144:PzuisYLtJd7uM73ADbymhp32imYsYVJwwh4/BOu8KQ3jrh41h5+lisy:PaStnUqmhpoCwwh06ho2u

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

vic

C2

grthom2h.no-ip.biz:5552

Mutex

07977633b8f530d5bde60b61999bac13

Attributes
  • reg_key

    07977633b8f530d5bde60b61999bac13

  • splitter

    |'|'|

Targets

    • Target

      3889a48fdee124bf502e54d3ce5ed8ff6f2049b2ac426be85d68c7b691680e4b

    • Size

      392KB

    • MD5

      7578da21c9c615e0c81f44c197375780

    • SHA1

      14e26a0792bfe3660be457a2dab3c1caf83306d9

    • SHA256

      3889a48fdee124bf502e54d3ce5ed8ff6f2049b2ac426be85d68c7b691680e4b

    • SHA512

      a52db33f938d5b79cbd9897a523894848ac4f5e49f060cc0a34cf0eb278418558d1f5d7115203fb5ebc24b81f5dd9a40934a95890adfe0a9b18a30a25f009e2a

    • SSDEEP

      6144:PzuisYLtJd7uM73ADbymhp32imYsYVJwwh4/BOu8KQ3jrh41h5+lisy:PaStnUqmhpoCwwh06ho2u

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks