General

  • Target

    7634d1448cced0d1dde1b6683b0d5affcae15ab0d7a4cd07f47c35b79c25487c

  • Size

    428KB

  • Sample

    221124-3na3ysbb2y

  • MD5

    494624a7c4635ec1374e978368300790

  • SHA1

    333b0657563dad23af048e02bd93c298344390b0

  • SHA256

    7634d1448cced0d1dde1b6683b0d5affcae15ab0d7a4cd07f47c35b79c25487c

  • SHA512

    3d6c9b6186cd58ee137c4dc1c8f05d6681765df89bfc57fb02546918fb823785df2061ab1a763074e78b0158e8f3dfdc5e260304697c9d1ab388f934f9655821

  • SSDEEP

    6144:8Y4U+RxzyuimwKFMuMwmHcLHXuqXAhlnVoew4+tQkSHgsgZcKeyjwXv5rPkEb:94VR9yiwKFMjwdQDVo5zQkags5

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Paltalk

C2

kurdio.ddns.net:1177

Mutex

5a580d7847d1ec2ce55fb9235946a695

Attributes
  • reg_key

    5a580d7847d1ec2ce55fb9235946a695

  • splitter

    |'|'|

Targets

    • Target

      7634d1448cced0d1dde1b6683b0d5affcae15ab0d7a4cd07f47c35b79c25487c

    • Size

      428KB

    • MD5

      494624a7c4635ec1374e978368300790

    • SHA1

      333b0657563dad23af048e02bd93c298344390b0

    • SHA256

      7634d1448cced0d1dde1b6683b0d5affcae15ab0d7a4cd07f47c35b79c25487c

    • SHA512

      3d6c9b6186cd58ee137c4dc1c8f05d6681765df89bfc57fb02546918fb823785df2061ab1a763074e78b0158e8f3dfdc5e260304697c9d1ab388f934f9655821

    • SSDEEP

      6144:8Y4U+RxzyuimwKFMuMwmHcLHXuqXAhlnVoew4+tQkSHgsgZcKeyjwXv5rPkEb:94VR9yiwKFMjwdQDVo5zQkags5

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks