General

  • Target

    882e02de429cb9f28dbee364485afe3956bc9f7ee1b52e021bcd5d6614e0b4d1

  • Size

    23KB

  • Sample

    221125-jcxb9sbb44

  • MD5

    300030c484a0e5846c01c8a5eb8a0c8d

  • SHA1

    31ae9bd60367dea8ba5fdc5fea77afac07e72883

  • SHA256

    882e02de429cb9f28dbee364485afe3956bc9f7ee1b52e021bcd5d6614e0b4d1

  • SHA512

    39e65aef7cbe47a2ba114748e859b669a85cca61173b01a75f56b2dfc9b072482d330ead0cd2e5c70d64c255af46ba7dc84ea09696e73fcd2cc8c03627dc4dc4

  • SSDEEP

    384:l/qUP2x0R4IxVISuI+M/Pdw6jgFI6VeOj1mRvR6JZlbw8hqIusZzZnFL:X4oA1Ic4Rpcnui

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ş ɑ͠ w̨̐ ☺☺☺ вłɑ͠c̝̚Ķ

C2

dzsaw10.no-ip.biz:55553

Mutex

4526c2cf151360c0d11ddeeb9772e52a

Attributes
  • reg_key

    4526c2cf151360c0d11ddeeb9772e52a

  • splitter

    |'|'|

Targets

    • Target

      882e02de429cb9f28dbee364485afe3956bc9f7ee1b52e021bcd5d6614e0b4d1

    • Size

      23KB

    • MD5

      300030c484a0e5846c01c8a5eb8a0c8d

    • SHA1

      31ae9bd60367dea8ba5fdc5fea77afac07e72883

    • SHA256

      882e02de429cb9f28dbee364485afe3956bc9f7ee1b52e021bcd5d6614e0b4d1

    • SHA512

      39e65aef7cbe47a2ba114748e859b669a85cca61173b01a75f56b2dfc9b072482d330ead0cd2e5c70d64c255af46ba7dc84ea09696e73fcd2cc8c03627dc4dc4

    • SSDEEP

      384:l/qUP2x0R4IxVISuI+M/Pdw6jgFI6VeOj1mRvR6JZlbw8hqIusZzZnFL:X4oA1Ic4Rpcnui

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks