General

  • Target

    8e377dd50c38dce40877ff7a9a253a22337582f4de9e7a84f61abd1a73a88732

  • Size

    281KB

  • Sample

    221021-w2x2baabc7

  • MD5

    188632a7cea8c8118ad0104f239feb00

  • SHA1

    375d58d7ba6b77270a8e0591cb020496b98bd9b3

  • SHA256

    8e377dd50c38dce40877ff7a9a253a22337582f4de9e7a84f61abd1a73a88732

  • SHA512

    2afddc5d63b173944715586e75549392300de501e979ec85a1bd813524a2fe227b332f9805843a58741a571d83f8220f931da1b866d393b2dbb863928b075cd5

  • SSDEEP

    6144:jeN1Mlv+PCBovdXcOwMC5b6oZQwcKl/D2:Ymlv+60MOw/5b6o9D

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

1

C2

127.0.0.1:5552

Mutex

573e9338f958850d02c24ec1df24c0d6

Attributes
  • reg_key

    573e9338f958850d02c24ec1df24c0d6

  • splitter

    |'|'|

Targets

    • Target

      8e377dd50c38dce40877ff7a9a253a22337582f4de9e7a84f61abd1a73a88732

    • Size

      281KB

    • MD5

      188632a7cea8c8118ad0104f239feb00

    • SHA1

      375d58d7ba6b77270a8e0591cb020496b98bd9b3

    • SHA256

      8e377dd50c38dce40877ff7a9a253a22337582f4de9e7a84f61abd1a73a88732

    • SHA512

      2afddc5d63b173944715586e75549392300de501e979ec85a1bd813524a2fe227b332f9805843a58741a571d83f8220f931da1b866d393b2dbb863928b075cd5

    • SSDEEP

      6144:jeN1Mlv+PCBovdXcOwMC5b6oZQwcKl/D2:Ymlv+60MOw/5b6o9D

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks