General

  • Target

    5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46

  • Size

    29KB

  • Sample

    221126-kl1xgsab4t

  • MD5

    a35802f39a336bee8b7fcf9fe772e730

  • SHA1

    f55f71d67b97ec64e53933fc6cc5eb7e66530cd8

  • SHA256

    5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46

  • SHA512

    70d98b4672471eb6bd0be01cbb58fab178ccd9c85b43da6dd972b27ca289b71b47111cf4e79bf21283df060baaa5ea918f8371b31da4482f8a7bcf1f6c3d970c

  • SSDEEP

    384:JYs5l7VL9skVQ42BkSv5dAsCGmqDm+jeI7GBsbh0w4wlAokw9OhgOL1vYRGOZzjq:57/skCXkQossqtje3BKh0p29SgR1w

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

aziza12.no-ip.biz:1177

Mutex

f26884cbd1211af8a3cd7b57fffc2aad

Attributes
  • reg_key

    f26884cbd1211af8a3cd7b57fffc2aad

  • splitter

    |'|'|

Targets

    • Target

      5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46

    • Size

      29KB

    • MD5

      a35802f39a336bee8b7fcf9fe772e730

    • SHA1

      f55f71d67b97ec64e53933fc6cc5eb7e66530cd8

    • SHA256

      5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46

    • SHA512

      70d98b4672471eb6bd0be01cbb58fab178ccd9c85b43da6dd972b27ca289b71b47111cf4e79bf21283df060baaa5ea918f8371b31da4482f8a7bcf1f6c3d970c

    • SSDEEP

      384:JYs5l7VL9skVQ42BkSv5dAsCGmqDm+jeI7GBsbh0w4wlAokw9OhgOL1vYRGOZzjq:57/skCXkQossqtje3BKh0p29SgR1w

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks