General

  • Target

    741beef8e611d73fc6f7a43628542d33f2ed2b4a5abcea9b63e325293ba5f658

  • Size

    29KB

  • Sample

    221124-krkgpacd53

  • MD5

    711ca078a67fad75a8118b363dd2890c

  • SHA1

    83e35fe72f83c0ed8678ed5cdc45f6823968dca5

  • SHA256

    741beef8e611d73fc6f7a43628542d33f2ed2b4a5abcea9b63e325293ba5f658

  • SHA512

    4317f65095871a03f6b5c2e85ff79f0d4d6e6a5d8310d79029b95a9a360cfaf65ba8838c29caaa2b6724125b10cd8637ba76dfaf51c4427e8abd8c5b89afaba9

  • SSDEEP

    768:fx77Kk4XeP/Fzsq+xre6BKh0p29SgRpo:l7K7W4zx3KhG29jpo

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

jookerjooker.no-ip.biz:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      741beef8e611d73fc6f7a43628542d33f2ed2b4a5abcea9b63e325293ba5f658

    • Size

      29KB

    • MD5

      711ca078a67fad75a8118b363dd2890c

    • SHA1

      83e35fe72f83c0ed8678ed5cdc45f6823968dca5

    • SHA256

      741beef8e611d73fc6f7a43628542d33f2ed2b4a5abcea9b63e325293ba5f658

    • SHA512

      4317f65095871a03f6b5c2e85ff79f0d4d6e6a5d8310d79029b95a9a360cfaf65ba8838c29caaa2b6724125b10cd8637ba76dfaf51c4427e8abd8c5b89afaba9

    • SSDEEP

      768:fx77Kk4XeP/Fzsq+xre6BKh0p29SgRpo:l7K7W4zx3KhG29jpo

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks