General

  • Target

    e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441

  • Size

    1.2MB

  • Sample

    221125-hnvgdacg7s

  • MD5

    6ed29f629da1a85b7b854aafda1e369a

  • SHA1

    25cdd05e00d1900aabca3e8a7d11f1a9e4547e3a

  • SHA256

    e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441

  • SHA512

    75833a06204dc1d763105ccd427d667cfab5f060e310ab329d243e71f00ae0aa65ecc322ff35291a6ddfcea912a84506d6a99c62d4c38dc4a1958d0b31bd176b

  • SSDEEP

    24576:0tb20pkaCqT5TBWgNQ7ar3YKEBCd1s31LgABGkoyXtkcnO16A:dVg5tQ7ar3GB+1eLFtvnG5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

A0AYFJ0PJtXGl9PaJat

C2

193.0.200.131:35689

Mutex

0dcfc9e55379c2e16a422bb33c97d277

Attributes
  • reg_key

    0dcfc9e55379c2e16a422bb33c97d277

  • splitter

    |'|'|

Targets

    • Target

      e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441

    • Size

      1.2MB

    • MD5

      6ed29f629da1a85b7b854aafda1e369a

    • SHA1

      25cdd05e00d1900aabca3e8a7d11f1a9e4547e3a

    • SHA256

      e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441

    • SHA512

      75833a06204dc1d763105ccd427d667cfab5f060e310ab329d243e71f00ae0aa65ecc322ff35291a6ddfcea912a84506d6a99c62d4c38dc4a1958d0b31bd176b

    • SSDEEP

      24576:0tb20pkaCqT5TBWgNQ7ar3YKEBCd1s31LgABGkoyXtkcnO16A:dVg5tQ7ar3GB+1eLFtvnG5

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

3
T1158

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Hidden Files and Directories

3
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks