General

  • Target

    c9a6906da93dbfbbf03dbef5eb0f92c08b3d32468bdb34eb7dd14fa4021765e8

  • Size

    23KB

  • Sample

    221123-qcynnagf8s

  • MD5

    b666c4da44542080af4e8d10035e3cae

  • SHA1

    4c1df8d41638200ab51d3c22c6d1854b0544a2e2

  • SHA256

    c9a6906da93dbfbbf03dbef5eb0f92c08b3d32468bdb34eb7dd14fa4021765e8

  • SHA512

    d8a835e5df93056ce193b4aa64bab04bb0c2a008d9385144500e6057d7d97de226283225e3f90386aeb8742db637a8bebb1031adf5fa09046f76d87e8dac235b

  • SSDEEP

    384:4sqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZNX:PSoQA6mlcrRpcnuG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

SAMEEDLCP

C2

themarlborough.co.vu:5150

Mutex

fb299416afb86ef6ecdbdf6738f8fa6c

Attributes
  • reg_key

    fb299416afb86ef6ecdbdf6738f8fa6c

  • splitter

    |'|'|

Targets

    • Target

      c9a6906da93dbfbbf03dbef5eb0f92c08b3d32468bdb34eb7dd14fa4021765e8

    • Size

      23KB

    • MD5

      b666c4da44542080af4e8d10035e3cae

    • SHA1

      4c1df8d41638200ab51d3c22c6d1854b0544a2e2

    • SHA256

      c9a6906da93dbfbbf03dbef5eb0f92c08b3d32468bdb34eb7dd14fa4021765e8

    • SHA512

      d8a835e5df93056ce193b4aa64bab04bb0c2a008d9385144500e6057d7d97de226283225e3f90386aeb8742db637a8bebb1031adf5fa09046f76d87e8dac235b

    • SSDEEP

      384:4sqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZNX:PSoQA6mlcrRpcnuG

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks