General

  • Target

    798301c500221b4dd6c1a9da48b072d4b0cb4d5e1197cf5de6d887b2b27a6efa

  • Size

    23KB

  • Sample

    221125-ztaslahf2x

  • MD5

    7fc8280df342ffd91ecf6b111b82704e

  • SHA1

    d3ead92ef2d3a928d1d17df20dbc045bd12b623a

  • SHA256

    798301c500221b4dd6c1a9da48b072d4b0cb4d5e1197cf5de6d887b2b27a6efa

  • SHA512

    9a26bd5f031170ba2384420f719e8982e9643b1b453e81a623f16a8da6f7f608c7bed647c8a7e6dcfb5f4bc6b6ebf7b37995d67dd502dc8e032ae99b2ce07ad6

  • SSDEEP

    384:GluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZmz:pOmhtIiRpcnub

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Victime

C2

adelkabyle.no-ip.biz:1177

Mutex

8765804f05506e2bf20cdfeb9d11a4c1

Attributes
  • reg_key

    8765804f05506e2bf20cdfeb9d11a4c1

  • splitter

    |'|'|

Targets

    • Target

      798301c500221b4dd6c1a9da48b072d4b0cb4d5e1197cf5de6d887b2b27a6efa

    • Size

      23KB

    • MD5

      7fc8280df342ffd91ecf6b111b82704e

    • SHA1

      d3ead92ef2d3a928d1d17df20dbc045bd12b623a

    • SHA256

      798301c500221b4dd6c1a9da48b072d4b0cb4d5e1197cf5de6d887b2b27a6efa

    • SHA512

      9a26bd5f031170ba2384420f719e8982e9643b1b453e81a623f16a8da6f7f608c7bed647c8a7e6dcfb5f4bc6b6ebf7b37995d67dd502dc8e032ae99b2ce07ad6

    • SSDEEP

      384:GluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZmz:pOmhtIiRpcnub

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks