General

  • Target

    bbadcdbdd8c03a623854640b3913047f3f50dee3e8d9c18eb051fab68435bd6e

  • Size

    29KB

  • Sample

    221125-zz63zsfc43

  • MD5

    9504f64c86189a728ea706572942ea0a

  • SHA1

    4df596f87840a2f6e9f7aa3ab0a0bdc214122fc8

  • SHA256

    bbadcdbdd8c03a623854640b3913047f3f50dee3e8d9c18eb051fab68435bd6e

  • SHA512

    a0ee733d2410bd220dc169be05115946fb4909aae0ad5cafb5abbea5e9ef9f7abc43302ec5d111b3b1c2c1559934d0f890c4a853ff0e1137609bdc2a4c785033

  • SSDEEP

    768:Kx77Kk4XeP/Fzsq+xre6BKh0p29SgRVF:E7K7W4zx3KhG29jVF

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

ADEL

C2

adelhacker04.no-ip.org:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      bbadcdbdd8c03a623854640b3913047f3f50dee3e8d9c18eb051fab68435bd6e

    • Size

      29KB

    • MD5

      9504f64c86189a728ea706572942ea0a

    • SHA1

      4df596f87840a2f6e9f7aa3ab0a0bdc214122fc8

    • SHA256

      bbadcdbdd8c03a623854640b3913047f3f50dee3e8d9c18eb051fab68435bd6e

    • SHA512

      a0ee733d2410bd220dc169be05115946fb4909aae0ad5cafb5abbea5e9ef9f7abc43302ec5d111b3b1c2c1559934d0f890c4a853ff0e1137609bdc2a4c785033

    • SSDEEP

      768:Kx77Kk4XeP/Fzsq+xre6BKh0p29SgRVF:E7K7W4zx3KhG29jVF

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks