General

  • Target

    ef4b617c15ad882a2336db5fead1e849a938f731a7ab5f0e514ef9aa6559cd6a

  • Size

    28KB

  • Sample

    221125-hlfkface9t

  • MD5

    8578b95d87f0dced871f1f9941b85ca2

  • SHA1

    d90f174ecc3046ca6b79002266c02bd6832eb327

  • SHA256

    ef4b617c15ad882a2336db5fead1e849a938f731a7ab5f0e514ef9aa6559cd6a

  • SHA512

    91ad1e87780be13111c094e5af2680ec33b2031c9cf8276bdcfde6f9ee1713afa29b7513db1333862eed5084a459c3a9a623456dfd7ebd18226116829e54958d

  • SSDEEP

    384:l6FLvll7jBFoYoKTtV529XiumqD0NDeIqGBsbh0w4wlAokw9OhgOL1vYRGOZzUZd:Y73oYoszmXcqoDewBKh0p29SgRmd

Malware Config

Extracted

Family

njrat

Version

0.6.4

C2

chiheb147.no-ip.biz:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      ef4b617c15ad882a2336db5fead1e849a938f731a7ab5f0e514ef9aa6559cd6a

    • Size

      28KB

    • MD5

      8578b95d87f0dced871f1f9941b85ca2

    • SHA1

      d90f174ecc3046ca6b79002266c02bd6832eb327

    • SHA256

      ef4b617c15ad882a2336db5fead1e849a938f731a7ab5f0e514ef9aa6559cd6a

    • SHA512

      91ad1e87780be13111c094e5af2680ec33b2031c9cf8276bdcfde6f9ee1713afa29b7513db1333862eed5084a459c3a9a623456dfd7ebd18226116829e54958d

    • SSDEEP

      384:l6FLvll7jBFoYoKTtV529XiumqD0NDeIqGBsbh0w4wlAokw9OhgOL1vYRGOZzUZd:Y73oYoszmXcqoDewBKh0p29SgRmd

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks