General

  • Target

    86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635

  • Size

    29KB

  • Sample

    221124-l8y7vaag8w

  • MD5

    f7a088b72af4379b1960acb2f724a9a8

  • SHA1

    a4a602b3e598c5721c65b713811f962d8a182c5c

  • SHA256

    86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635

  • SHA512

    3e1b8f327c9fb59f8980bf82e3fcc28b484ebe1b61936063addbdea18ef58b724d7c5b849bffc6822550387d0523a97312fccd160478c58670b53d0f0d092c15

  • SSDEEP

    768:/x77Kk4XeP/Fzsq+xre6BKh0p29SgRVe:F7K7W4zx3KhG29jVe

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

zabanahacker.no-ip.org:1021

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635

    • Size

      29KB

    • MD5

      f7a088b72af4379b1960acb2f724a9a8

    • SHA1

      a4a602b3e598c5721c65b713811f962d8a182c5c

    • SHA256

      86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635

    • SHA512

      3e1b8f327c9fb59f8980bf82e3fcc28b484ebe1b61936063addbdea18ef58b724d7c5b849bffc6822550387d0523a97312fccd160478c58670b53d0f0d092c15

    • SSDEEP

      768:/x77Kk4XeP/Fzsq+xre6BKh0p29SgRVe:F7K7W4zx3KhG29jVe

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks