General

  • Target

    34253c7c851a1d2e24ccaf5f6e6828ab9f2145c79967b2d0abf1740b7a9fd900

  • Size

    192KB

  • Sample

    221126-kefmzahg8z

  • MD5

    943f756626ce91cde9b9246e26642039

  • SHA1

    a633aa256f687d95fa746efcb8d8c55da309b879

  • SHA256

    34253c7c851a1d2e24ccaf5f6e6828ab9f2145c79967b2d0abf1740b7a9fd900

  • SHA512

    125109e78c64516b30de6d757c5d36e8d69ecc8efb3e4a9780e8a2ba130ad3d079b6f702023d353e6168a2d14cf0357482373047fd02b7edc29ffc266323bee8

  • SSDEEP

    3072:E2tbXewZT3vviEj3IbQhbElPYSIeXkOAAeSTYSijsFCOJHeI6Awd:E2tbX/v8bQ653BXktVSsTSCOhDc

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Slave

C2

shadowraze.ddns.net:6357

Mutex

35030464d16f3980d0eef2fa9a17c25f

Attributes
  • reg_key

    35030464d16f3980d0eef2fa9a17c25f

  • splitter

    |'|'|

Targets

    • Target

      34253c7c851a1d2e24ccaf5f6e6828ab9f2145c79967b2d0abf1740b7a9fd900

    • Size

      192KB

    • MD5

      943f756626ce91cde9b9246e26642039

    • SHA1

      a633aa256f687d95fa746efcb8d8c55da309b879

    • SHA256

      34253c7c851a1d2e24ccaf5f6e6828ab9f2145c79967b2d0abf1740b7a9fd900

    • SHA512

      125109e78c64516b30de6d757c5d36e8d69ecc8efb3e4a9780e8a2ba130ad3d079b6f702023d353e6168a2d14cf0357482373047fd02b7edc29ffc266323bee8

    • SSDEEP

      3072:E2tbXewZT3vviEj3IbQhbElPYSIeXkOAAeSTYSijsFCOJHeI6Awd:E2tbX/v8bQ653BXktVSsTSCOhDc

    • Modifies WinLogon for persistence

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks