General

  • Target

    3f42af689ada1936d2064c21934d78a398674d29a7e788baf9b0334d46d73742

  • Size

    31KB

  • Sample

    221125-kd4y6shc2s

  • MD5

    8406f57abc245f2c0f8614cee9d7a2db

  • SHA1

    daaa445f6aa1021cf2296ffe9142e7ab3495e36e

  • SHA256

    3f42af689ada1936d2064c21934d78a398674d29a7e788baf9b0334d46d73742

  • SHA512

    b5398dd33116e01f456bcd7278736a359a9e8654ff46d3eed677ae00b906f536091b116ef660bc5a9196af38673559e1180e33991fea6c43913b79d951be0ddc

  • SSDEEP

    768:QPwoqkZlH/azx1+ta+q3U97v8CQmIDUu0tiMzj:34qSpnQVkXj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

sosi

C2

159.89.121.217:54321

Mutex

79412c435974e3cec2117f2d47b1e5d7

Attributes
  • reg_key

    79412c435974e3cec2117f2d47b1e5d7

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      3f42af689ada1936d2064c21934d78a398674d29a7e788baf9b0334d46d73742

    • Size

      31KB

    • MD5

      8406f57abc245f2c0f8614cee9d7a2db

    • SHA1

      daaa445f6aa1021cf2296ffe9142e7ab3495e36e

    • SHA256

      3f42af689ada1936d2064c21934d78a398674d29a7e788baf9b0334d46d73742

    • SHA512

      b5398dd33116e01f456bcd7278736a359a9e8654ff46d3eed677ae00b906f536091b116ef660bc5a9196af38673559e1180e33991fea6c43913b79d951be0ddc

    • SSDEEP

      768:QPwoqkZlH/azx1+ta+q3U97v8CQmIDUu0tiMzj:34qSpnQVkXj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks