General

  • Target

    7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004

  • Size

    1.2MB

  • Sample

    221124-3dmn1afc55

  • MD5

    2aa9a6fedcd536a0863a2040772cf11d

  • SHA1

    2b8e4757d46aa38e5cbafe0cd64cbb4409f09507

  • SHA256

    7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004

  • SHA512

    3fef57b72dfeafba37a1ab78aad232315fca4f078fdd3ef2f84e20f9e9cb99e84ac522a47704ba041f6fcc1d06bd96f41f2c19c61c6fe9b15de6a173a5dfbbd9

  • SSDEEP

    12288:MgadJfTztJr15d2swcOekReZWml4R8cov2tSUJnS9Yss40HQ3TBqqvrLrZTP57l:Yd98+0vAUJnAjBHvr/ZTP57

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

joker1787.no-ip.biz:1984

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004

    • Size

      1.2MB

    • MD5

      2aa9a6fedcd536a0863a2040772cf11d

    • SHA1

      2b8e4757d46aa38e5cbafe0cd64cbb4409f09507

    • SHA256

      7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004

    • SHA512

      3fef57b72dfeafba37a1ab78aad232315fca4f078fdd3ef2f84e20f9e9cb99e84ac522a47704ba041f6fcc1d06bd96f41f2c19c61c6fe9b15de6a173a5dfbbd9

    • SSDEEP

      12288:MgadJfTztJr15d2swcOekReZWml4R8cov2tSUJnS9Yss40HQ3TBqqvrLrZTP57l:Yd98+0vAUJnAjBHvr/ZTP57

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks