General

  • Target

    Purchase Order-3949.img

  • Size

    60KB

  • Sample

    221031-td68zacbhp

  • MD5

    20ddf8b3df5865e825606808e5c5c2d3

  • SHA1

    da42463426bf5d7fa76eb154a423373eab4d5c89

  • SHA256

    c743cceb40ece2a6b4f1e11b2d5634853a91fb6c5d119781c860be0f7ec18bc2

  • SHA512

    f9e2c6e95bb7ce423f59c97114f6f991e014ba20fb67ff1510d162616f5ac41bfd504a57302e8b30a7a55fba8255eec4bfd89c17d206f005dd3332f4b95809a6

  • SSDEEP

    192:x1Az57uraMskWOB72ebPd8stYcFmVc03KY:x1Az57uzBWOBqydptYcFmVc03K

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

update

C2

money2022.ddns.net:8080

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      Purchase Order-3949.exe

    • Size

      9KB

    • MD5

      6dbda41adc2c005487f99f7691b0bd3e

    • SHA1

      81c4647c3ed92ccf711f54184d0422548b9edbf2

    • SHA256

      77dafa65cc482bfac093bdf278ca1a70fae90b59b756bdec1d581da3ea55953d

    • SHA512

      98c83e56a5fc6577e54c054a68fa42b77c2bbe569656c76d8c062eaf40013e7fa7ff27eb41487b0501ddd3f42584285892e8fe2f0d81ef6ac4958b588b5238b1

    • SSDEEP

      192:/1Az57uraMskWOB72ebPd8stYcFmVc03KY:/1Az57uzBWOBqydptYcFmVc03K

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks