General

  • Target

    f1c45dcab791f8e0ed057d4f50a564e4f81313151ab0320fbe3bc6c5bac54505

  • Size

    57KB

  • Sample

    221124-cnh6fsah96

  • MD5

    267d180695106d81debe52f6f20ad261

  • SHA1

    151171d9d720d166719f9bb1b95b18007127b946

  • SHA256

    f1c45dcab791f8e0ed057d4f50a564e4f81313151ab0320fbe3bc6c5bac54505

  • SHA512

    09b4f8c0b8be2eedfa7ebe5f03dd27851778de4d7f161462eb357632a7e37e19adbf44761227a086b80c1455e2b54cfeb299ef9c27155f42f8c289f1dbe3d51c

  • SSDEEP

    1536:Ig+dL1sfm++vZkeQzpKbzuqtGVibs6EFwz96:Ig+dLOe+O/2cMaz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

5649c39203f1efe3450f25e6b18b84f1

Attributes
  • reg_key

    5649c39203f1efe3450f25e6b18b84f1

  • splitter

    |'|'|

Targets

    • Target

      f1c45dcab791f8e0ed057d4f50a564e4f81313151ab0320fbe3bc6c5bac54505

    • Size

      57KB

    • MD5

      267d180695106d81debe52f6f20ad261

    • SHA1

      151171d9d720d166719f9bb1b95b18007127b946

    • SHA256

      f1c45dcab791f8e0ed057d4f50a564e4f81313151ab0320fbe3bc6c5bac54505

    • SHA512

      09b4f8c0b8be2eedfa7ebe5f03dd27851778de4d7f161462eb357632a7e37e19adbf44761227a086b80c1455e2b54cfeb299ef9c27155f42f8c289f1dbe3d51c

    • SSDEEP

      1536:Ig+dL1sfm++vZkeQzpKbzuqtGVibs6EFwz96:Ig+dLOe+O/2cMaz

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks