General

  • Target

    8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c

  • Size

    23KB

  • Sample

    221124-2cb1fagc3x

  • MD5

    32f2552072f676c1e6f015d2f7304f23

  • SHA1

    0bc9defa91e27b066dd7c5f12b2e5b8ebedc8946

  • SHA256

    8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c

  • SHA512

    3b7d1942daec9e5101ac7b045e2e999650d5a6ad863af62c7fcdfd408164351758e5abc8b334a536c6f5254dda44097c5c67914e44dc0685275bf636631139ea

  • SSDEEP

    384:a0jeCIYTNQZUuQnJXJeCXlwhPQ6VgDOwBHhdmRvR6JZlbw8hqIusZzZpFGrFM:F3jNAU/ZVX6Rpcnuk2e

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed by parosh

C2

parosh22.ddns.net:1177

Mutex

e4995e55c0970b64807d63edc8a971a5

Attributes
  • reg_key

    e4995e55c0970b64807d63edc8a971a5

  • splitter

    |'|'|

Targets

    • Target

      8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c

    • Size

      23KB

    • MD5

      32f2552072f676c1e6f015d2f7304f23

    • SHA1

      0bc9defa91e27b066dd7c5f12b2e5b8ebedc8946

    • SHA256

      8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c

    • SHA512

      3b7d1942daec9e5101ac7b045e2e999650d5a6ad863af62c7fcdfd408164351758e5abc8b334a536c6f5254dda44097c5c67914e44dc0685275bf636631139ea

    • SSDEEP

      384:a0jeCIYTNQZUuQnJXJeCXlwhPQ6VgDOwBHhdmRvR6JZlbw8hqIusZzZpFGrFM:F3jNAU/ZVX6Rpcnuk2e

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks