General

  • Target

    3889cd880910601d232b14bdd2aaeeb2dd8ae34def20d21596cfe1672ce1460e

  • Size

    23KB

  • Sample

    221029-ms8xsadedm

  • MD5

    fb2ef83744c438c6e1bf6472096d3dbd

  • SHA1

    0192d529d57717c136af2eea212184136f95dad7

  • SHA256

    3889cd880910601d232b14bdd2aaeeb2dd8ae34def20d21596cfe1672ce1460e

  • SHA512

    ecb8cc79c33264fdc369aa9d4ec23067376ae41e79d0c440d1d6afd6d6678f692edfba582fbba3e759fe3eb3549d7df7698541e3b3c2473ae25ae21b1152bd28

  • SSDEEP

    384:/cqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZfa:k30py6vhxaRpcnuh

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

1

C2

zazagamer.no-ip.biz:5552

Mutex

129a19d259ac53b5bd4415bbb9a6da02

Attributes
  • reg_key

    129a19d259ac53b5bd4415bbb9a6da02

  • splitter

    |'|'|

Targets

    • Target

      3889cd880910601d232b14bdd2aaeeb2dd8ae34def20d21596cfe1672ce1460e

    • Size

      23KB

    • MD5

      fb2ef83744c438c6e1bf6472096d3dbd

    • SHA1

      0192d529d57717c136af2eea212184136f95dad7

    • SHA256

      3889cd880910601d232b14bdd2aaeeb2dd8ae34def20d21596cfe1672ce1460e

    • SHA512

      ecb8cc79c33264fdc369aa9d4ec23067376ae41e79d0c440d1d6afd6d6678f692edfba582fbba3e759fe3eb3549d7df7698541e3b3c2473ae25ae21b1152bd28

    • SSDEEP

      384:/cqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZfa:k30py6vhxaRpcnuh

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks