General

  • Target

    3019ff465d9d7c657aa4e111da5212ffefa360d50a4586274bd38e067c7211f8

  • Size

    23KB

  • Sample

    221125-lnl2sage69

  • MD5

    ba92dad10756935c6ba911220142f649

  • SHA1

    52179e698584dc1eac64a0932db3df602a75b22e

  • SHA256

    3019ff465d9d7c657aa4e111da5212ffefa360d50a4586274bd38e067c7211f8

  • SHA512

    9323e99c80a76cd209d987bcbe25750e9ded79a657701802713fd70101550d9e84886afb329e62f5499870dfd2cb158b9cd3111e8e59cf8685eb22c26bb399c3

  • SSDEEP

    384:d53gexUw/L+JrgUon5b9uSDMwT9Pfg6NgrWoBYi51mRvR6JZlbw8hqIusZzZX2:dVIAKG91DP1hPRpcnu9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

BDOCERT

C2

oqbpregoqbpreg.ddns.net:5552

Mutex

60bab2eed75ad3333f713f5b24bffad6

Attributes
  • reg_key

    60bab2eed75ad3333f713f5b24bffad6

  • splitter

    |'|'|

Targets

    • Target

      3019ff465d9d7c657aa4e111da5212ffefa360d50a4586274bd38e067c7211f8

    • Size

      23KB

    • MD5

      ba92dad10756935c6ba911220142f649

    • SHA1

      52179e698584dc1eac64a0932db3df602a75b22e

    • SHA256

      3019ff465d9d7c657aa4e111da5212ffefa360d50a4586274bd38e067c7211f8

    • SHA512

      9323e99c80a76cd209d987bcbe25750e9ded79a657701802713fd70101550d9e84886afb329e62f5499870dfd2cb158b9cd3111e8e59cf8685eb22c26bb399c3

    • SSDEEP

      384:d53gexUw/L+JrgUon5b9uSDMwT9Pfg6NgrWoBYi51mRvR6JZlbw8hqIusZzZX2:dVIAKG91DP1hPRpcnu9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks