General

  • Target

    1d9c36c9efbc84bdd291d06d426ebcbb6561dfd769e131d7fb037c3042cc9703

  • Size

    111KB

  • Sample

    221125-esth4aag57

  • MD5

    2703252dba3070e2816f24bc3079a224

  • SHA1

    98313a6ddd52ce75c931036c8c58fa70514a5663

  • SHA256

    1d9c36c9efbc84bdd291d06d426ebcbb6561dfd769e131d7fb037c3042cc9703

  • SHA512

    eea1d9d41f2d0219fea0be613d9652755ac3602b1c4743c7708f0845bb5c842ed18a8bc5ea2a445e38f606ccb174963e15865ab6f160c9c1912ead6cfd8d6c1a

  • SSDEEP

    1536:xbC830RWuvjpHiQzAygMrer647sejE5xxN/55OvksxbRkPMXuKtzqnaQi98Wqkpw:FC8k0n0AIZ47iSw6rlw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ZOM

C2

satanhoks666.no-ip.biz:666

Mutex

89d1821afe5aca4fd6ec386f735c5634

Attributes
  • reg_key

    89d1821afe5aca4fd6ec386f735c5634

  • splitter

    |'|'|

Targets

    • Target

      1d9c36c9efbc84bdd291d06d426ebcbb6561dfd769e131d7fb037c3042cc9703

    • Size

      111KB

    • MD5

      2703252dba3070e2816f24bc3079a224

    • SHA1

      98313a6ddd52ce75c931036c8c58fa70514a5663

    • SHA256

      1d9c36c9efbc84bdd291d06d426ebcbb6561dfd769e131d7fb037c3042cc9703

    • SHA512

      eea1d9d41f2d0219fea0be613d9652755ac3602b1c4743c7708f0845bb5c842ed18a8bc5ea2a445e38f606ccb174963e15865ab6f160c9c1912ead6cfd8d6c1a

    • SSDEEP

      1536:xbC830RWuvjpHiQzAygMrer647sejE5xxN/55OvksxbRkPMXuKtzqnaQi98Wqkpw:FC8k0n0AIZ47iSw6rlw

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks