General

  • Target

    67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09

  • Size

    638KB

  • Sample

    221123-zjdfqsga7v

  • MD5

    d9f6bff1ee2812647e534b793b8a5b3e

  • SHA1

    a6215720497667a69cc9a2f58eb826131ca05068

  • SHA256

    67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09

  • SHA512

    cbe3c7ba9db6ad1509a4bb62b8cb9234874943ba23fbdb0d220c2c84b6ed95d0748c7216aadab9036a2b2dfe3d6b57d8648423cff74ed25211dbfd881001cd37

  • SSDEEP

    12288:psTri9uod71pwGuB7DNnu5I1jhxgmZw1lb4K1ebqdpCAq/r1zhrWFumg2:psTrikod71pwGuB7DNnui1jbx051ebqm

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

mehdimoro.ddns.net:5555

Mutex

4aeed655f342a0295abb3112731f878a

Attributes
  • reg_key

    4aeed655f342a0295abb3112731f878a

  • splitter

    |'|'|

Targets

    • Target

      67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09

    • Size

      638KB

    • MD5

      d9f6bff1ee2812647e534b793b8a5b3e

    • SHA1

      a6215720497667a69cc9a2f58eb826131ca05068

    • SHA256

      67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09

    • SHA512

      cbe3c7ba9db6ad1509a4bb62b8cb9234874943ba23fbdb0d220c2c84b6ed95d0748c7216aadab9036a2b2dfe3d6b57d8648423cff74ed25211dbfd881001cd37

    • SSDEEP

      12288:psTri9uod71pwGuB7DNnu5I1jhxgmZw1lb4K1ebqdpCAq/r1zhrWFumg2:psTrikod71pwGuB7DNnui1jbx051ebqm

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks