General

  • Target

    1c6ea57d7887d69e221806107185ba12a33790d676aa5228a1c29b5b611bec64

  • Size

    23KB

  • Sample

    221125-ztc8qaef99

  • MD5

    e32a03453d15bac1ca444de6737daf1f

  • SHA1

    f18110d0073607683ddf591b42b14b1413cece72

  • SHA256

    1c6ea57d7887d69e221806107185ba12a33790d676aa5228a1c29b5b611bec64

  • SHA512

    a4afff12153e6c0663fe4b486f8b658cb143175620991b4b66df834b40452cef8ed598bda6aa09c00dc851deee34c77a0bd29640ae5a04f84471dd67b5533e4d

  • SSDEEP

    384:xY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZZRO:GL2s+tRyRpcnu+O

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

1

C2

x-devil50099005.ddns.net:5552

Mutex

f38a836a5b74e1e1fd161ce744b606ef

Attributes
  • reg_key

    f38a836a5b74e1e1fd161ce744b606ef

  • splitter

    |'|'|

Targets

    • Target

      1c6ea57d7887d69e221806107185ba12a33790d676aa5228a1c29b5b611bec64

    • Size

      23KB

    • MD5

      e32a03453d15bac1ca444de6737daf1f

    • SHA1

      f18110d0073607683ddf591b42b14b1413cece72

    • SHA256

      1c6ea57d7887d69e221806107185ba12a33790d676aa5228a1c29b5b611bec64

    • SHA512

      a4afff12153e6c0663fe4b486f8b658cb143175620991b4b66df834b40452cef8ed598bda6aa09c00dc851deee34c77a0bd29640ae5a04f84471dd67b5533e4d

    • SSDEEP

      384:xY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZZRO:GL2s+tRyRpcnu+O

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks