General

  • Target

    9f42320dfbf5defbe21455ef824e711a5e603703631d9f1669abe8b6d54fcdf1

  • Size

    23KB

  • Sample

    221125-3nfnfaac2x

  • MD5

    42d1b2dfdf83b0f1e5e257072a51108b

  • SHA1

    981a6ec09bc61778025a4a654c0f161b1255ff40

  • SHA256

    9f42320dfbf5defbe21455ef824e711a5e603703631d9f1669abe8b6d54fcdf1

  • SHA512

    908446fddfebfa655b443562048027500f26c2a9c046b5b13c4a3689885808d1d3b54fce30a35db86bc87996af8cba2ad8599b2c2b51bb87e825ece2df1e30e7

  • SSDEEP

    384:G+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZcozEu:5m+71d5XRpcnu2D

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

hacker

C2

mrcod.publicvm.com:1177

Mutex

0b0829e06d028299289e683c2462e806

Attributes
  • reg_key

    0b0829e06d028299289e683c2462e806

  • splitter

    |'|'|

Targets

    • Target

      9f42320dfbf5defbe21455ef824e711a5e603703631d9f1669abe8b6d54fcdf1

    • Size

      23KB

    • MD5

      42d1b2dfdf83b0f1e5e257072a51108b

    • SHA1

      981a6ec09bc61778025a4a654c0f161b1255ff40

    • SHA256

      9f42320dfbf5defbe21455ef824e711a5e603703631d9f1669abe8b6d54fcdf1

    • SHA512

      908446fddfebfa655b443562048027500f26c2a9c046b5b13c4a3689885808d1d3b54fce30a35db86bc87996af8cba2ad8599b2c2b51bb87e825ece2df1e30e7

    • SSDEEP

      384:G+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZcozEu:5m+71d5XRpcnu2D

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks