General

  • Target

    af8f36deface0d891ad947f70f47f9e6febdd117a9bc8cdcf9fb9dd08c23bf62

  • Size

    207KB

  • Sample

    221124-zh4ljaha95

  • MD5

    80305a0b2bbe713147ac46edf1e3e98b

  • SHA1

    9ddd3c3085b9cbb4d1eed3ee1454e0c7a042fd25

  • SHA256

    af8f36deface0d891ad947f70f47f9e6febdd117a9bc8cdcf9fb9dd08c23bf62

  • SHA512

    c919801b125cb18e72f64eda7f4241468cbdaefbb29ee30c11424d1e2416a708e82f747488f68fdc71e6e85c035ed453cbfa09de2f2b0a5d76edfab6d36062e2

  • SSDEEP

    3072:l/ok70dA+C1DEewDw8eA9LIVFxNgvrc2/Ktax09tbSpcl2GTP31EeR:lL1eeyQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

KURD_PRDE

C2

kurdprde.noip.me:1177

Mutex

283733562dbbe5f8a62f7e99d428c246

Attributes
  • reg_key

    283733562dbbe5f8a62f7e99d428c246

  • splitter

    |'|'|

Targets

    • Target

      af8f36deface0d891ad947f70f47f9e6febdd117a9bc8cdcf9fb9dd08c23bf62

    • Size

      207KB

    • MD5

      80305a0b2bbe713147ac46edf1e3e98b

    • SHA1

      9ddd3c3085b9cbb4d1eed3ee1454e0c7a042fd25

    • SHA256

      af8f36deface0d891ad947f70f47f9e6febdd117a9bc8cdcf9fb9dd08c23bf62

    • SHA512

      c919801b125cb18e72f64eda7f4241468cbdaefbb29ee30c11424d1e2416a708e82f747488f68fdc71e6e85c035ed453cbfa09de2f2b0a5d76edfab6d36062e2

    • SSDEEP

      3072:l/ok70dA+C1DEewDw8eA9LIVFxNgvrc2/Ktax09tbSpcl2GTP31EeR:lL1eeyQ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks