General

  • Target

    334fe3b376bf10fac2a08efbd1bad31935e84612cae4e8bab6c33cfc2ac2cf1e

  • Size

    210KB

  • Sample

    221125-djlw8aga35

  • MD5

    db54abe9cd4cf784164bffd2f72116d7

  • SHA1

    b3dd3c0d0b4fcdbd10cddfd9787cc9dccfa45e46

  • SHA256

    334fe3b376bf10fac2a08efbd1bad31935e84612cae4e8bab6c33cfc2ac2cf1e

  • SHA512

    365e59ace3bada5253b60ff155a4454ced9072096207efe7862bdd35933c3d9f0e40fcff354100b3bb8573693d39eadc5cfbe0332c92948e2bda865799161df7

  • SSDEEP

    3072:nvssA29+e43idX6zbvOezG0z/3XKnkACUZuw7vi2cgK4Lt0Kpu6WA+NPjuTsUeQY:H9cikPO8+GL6MjUe6vATgk

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

كرار هكر العراق

C2

karar101.ddns.net:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      334fe3b376bf10fac2a08efbd1bad31935e84612cae4e8bab6c33cfc2ac2cf1e

    • Size

      210KB

    • MD5

      db54abe9cd4cf784164bffd2f72116d7

    • SHA1

      b3dd3c0d0b4fcdbd10cddfd9787cc9dccfa45e46

    • SHA256

      334fe3b376bf10fac2a08efbd1bad31935e84612cae4e8bab6c33cfc2ac2cf1e

    • SHA512

      365e59ace3bada5253b60ff155a4454ced9072096207efe7862bdd35933c3d9f0e40fcff354100b3bb8573693d39eadc5cfbe0332c92948e2bda865799161df7

    • SSDEEP

      3072:nvssA29+e43idX6zbvOezG0z/3XKnkACUZuw7vi2cgK4Lt0Kpu6WA+NPjuTsUeQY:H9cikPO8+GL6MjUe6vATgk

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks