General

  • Target

    70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8

  • Size

    29KB

  • Sample

    221123-lnlq1sfc3w

  • MD5

    394898effddbcb4730c06d1564af978d

  • SHA1

    1eb2c9b1923ca8b9d8b3cdbef872506a6d74680d

  • SHA256

    70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8

  • SHA512

    866c07fba65067545339f91335fca9c459f6bec20eaab28dfb53b68f73ac44a6a569490e17927c97cbac0e81c2826425908ce74a3524983dd243b7f3c0322f6c

  • SSDEEP

    384:aBgJGJl7tj1Msagab1h5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGOG:aZ7nMsanzR+2cqEDveyBKh0p29SgRJO

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

mhacker783.no-ip.org:1177

Mutex

dda179c09ae689633f05cced9ee19fb5

Attributes
  • reg_key

    dda179c09ae689633f05cced9ee19fb5

  • splitter

    |'|'|

Targets

    • Target

      70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8

    • Size

      29KB

    • MD5

      394898effddbcb4730c06d1564af978d

    • SHA1

      1eb2c9b1923ca8b9d8b3cdbef872506a6d74680d

    • SHA256

      70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8

    • SHA512

      866c07fba65067545339f91335fca9c459f6bec20eaab28dfb53b68f73ac44a6a569490e17927c97cbac0e81c2826425908ce74a3524983dd243b7f3c0322f6c

    • SSDEEP

      384:aBgJGJl7tj1Msagab1h5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGOG:aZ7nMsanzR+2cqEDveyBKh0p29SgRJO

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks