General

  • Target

    332fcdb473326bef8e0b5ee521dad16102b00e370d8398b418a1e95985b61cc6

  • Size

    23KB

  • Sample

    221126-kmhgjaab5z

  • MD5

    8e79b6d1203f62e32b87a58f4768b08c

  • SHA1

    627c9969d302863371d2ddcfbb1209b36a79e135

  • SHA256

    332fcdb473326bef8e0b5ee521dad16102b00e370d8398b418a1e95985b61cc6

  • SHA512

    479877a188731f5120a82c865f0b476fa2ce62012a5544364b305e3106d108ea1ef111e26366113bf2697a892dfe1b45b62b576a42aa7d5e6284f6eb0584c7e3

  • SSDEEP

    384:zY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZr7:cL2s+tRyRpcnuM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Bot

C2

smuktnet.ddns.net:5552

Mutex

d5bf5ee18952025404f8d39dc09f66a5

Attributes
  • reg_key

    d5bf5ee18952025404f8d39dc09f66a5

  • splitter

    |'|'|

Targets

    • Target

      332fcdb473326bef8e0b5ee521dad16102b00e370d8398b418a1e95985b61cc6

    • Size

      23KB

    • MD5

      8e79b6d1203f62e32b87a58f4768b08c

    • SHA1

      627c9969d302863371d2ddcfbb1209b36a79e135

    • SHA256

      332fcdb473326bef8e0b5ee521dad16102b00e370d8398b418a1e95985b61cc6

    • SHA512

      479877a188731f5120a82c865f0b476fa2ce62012a5544364b305e3106d108ea1ef111e26366113bf2697a892dfe1b45b62b576a42aa7d5e6284f6eb0584c7e3

    • SSDEEP

      384:zY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZr7:cL2s+tRyRpcnuM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks