General

  • Target

    17a21bd371c3e54a64af64ac04f697143143cfc11cbee9e7a3cbc3054d042678

  • Size

    23KB

  • Sample

    221126-kmk8esab6t

  • MD5

    7a30155400c382d970dd3e9a2b1cf51c

  • SHA1

    5d49e2d1198b6f2a66b97cd829870867a6087f6d

  • SHA256

    17a21bd371c3e54a64af64ac04f697143143cfc11cbee9e7a3cbc3054d042678

  • SHA512

    525185ee05fd176fd6c8705c207fed3e59892d1eb9cd9f03998219edf9496af13f712275bb83e0c9a14ba1659051a8dbe98a67730cb1a930b39ef9f591bc4687

  • SSDEEP

    384:fluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZ6yG:oOmhtIiRpcnuX

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

mc-blacklife.no-ip.biz:5552

Mutex

3f4e358b856b31a528301fb65300dd44

Attributes
  • reg_key

    3f4e358b856b31a528301fb65300dd44

  • splitter

    |'|'|

Targets

    • Target

      17a21bd371c3e54a64af64ac04f697143143cfc11cbee9e7a3cbc3054d042678

    • Size

      23KB

    • MD5

      7a30155400c382d970dd3e9a2b1cf51c

    • SHA1

      5d49e2d1198b6f2a66b97cd829870867a6087f6d

    • SHA256

      17a21bd371c3e54a64af64ac04f697143143cfc11cbee9e7a3cbc3054d042678

    • SHA512

      525185ee05fd176fd6c8705c207fed3e59892d1eb9cd9f03998219edf9496af13f712275bb83e0c9a14ba1659051a8dbe98a67730cb1a930b39ef9f591bc4687

    • SSDEEP

      384:fluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZ6yG:oOmhtIiRpcnuX

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks