General

  • Target

    PO_Order_938340.exe

  • Size

    10KB

  • Sample

    221102-18g1wsccd9

  • MD5

    8b482947f8aa69e7f21bb5d51c363135

  • SHA1

    c69562bcff1e0b2805ae38be46ec5f54bd2f6e6f

  • SHA256

    fe131007f2c005a4141d5febb5b029bdabe5fc18de34edc10a8e98569e1ce8d5

  • SHA512

    766ade825736e72728767aea49aa184730a8ec39e8ff7559052d801273bd3eb85da3163b4c9979ab56cdc3d7e013fd224b141da477b36ee633028543cc9902e5

  • SSDEEP

    192:b0EWlq8R7nEywHjhqfLL9ONRjKdg8stYcFmVc03KY:b0EWlq+7EywHkfLL9ONRCgptYcFmVc06

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

update

C2

money2022.ddns.net:8080

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      PO_Order_938340.exe

    • Size

      10KB

    • MD5

      8b482947f8aa69e7f21bb5d51c363135

    • SHA1

      c69562bcff1e0b2805ae38be46ec5f54bd2f6e6f

    • SHA256

      fe131007f2c005a4141d5febb5b029bdabe5fc18de34edc10a8e98569e1ce8d5

    • SHA512

      766ade825736e72728767aea49aa184730a8ec39e8ff7559052d801273bd3eb85da3163b4c9979ab56cdc3d7e013fd224b141da477b36ee633028543cc9902e5

    • SSDEEP

      192:b0EWlq8R7nEywHjhqfLL9ONRjKdg8stYcFmVc03KY:b0EWlq+7EywHkfLL9ONRCgptYcFmVc06

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks