General

  • Target

    b806fb9e82114d10baa1a1447b071819ad66d6db039f80fe9a501e7fa9ce4f8c

  • Size

    23KB

  • Sample

    221128-asrx2sfa8x

  • MD5

    b4fe61383938df9253137268d7f43cbf

  • SHA1

    0b67e79550db6ac17da2cc5ac803cafc6ac43b82

  • SHA256

    b806fb9e82114d10baa1a1447b071819ad66d6db039f80fe9a501e7fa9ce4f8c

  • SHA512

    c9731e9a9aa17cb81f0a92906845033acf55710deb4ac4d86abef369f8aa55650253e6ce1635c08560f44bea43dc05a51bababf5dc44ec05251172f89c9ee802

  • SSDEEP

    384:n+4Q+SAN7uprgvM5OSUswZXg6ngbm4hfpFmRvR6JZlbw8hqIusZzZmn:n8OaxVUVRpcnuf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

system

C2

mstafa-king1.ddns.net:1177

Mutex

fbcdb3cbc5958cd8f7e96a3b01acbd45

Attributes
  • reg_key

    fbcdb3cbc5958cd8f7e96a3b01acbd45

  • splitter

    |'|'|

Targets

    • Target

      b806fb9e82114d10baa1a1447b071819ad66d6db039f80fe9a501e7fa9ce4f8c

    • Size

      23KB

    • MD5

      b4fe61383938df9253137268d7f43cbf

    • SHA1

      0b67e79550db6ac17da2cc5ac803cafc6ac43b82

    • SHA256

      b806fb9e82114d10baa1a1447b071819ad66d6db039f80fe9a501e7fa9ce4f8c

    • SHA512

      c9731e9a9aa17cb81f0a92906845033acf55710deb4ac4d86abef369f8aa55650253e6ce1635c08560f44bea43dc05a51bababf5dc44ec05251172f89c9ee802

    • SSDEEP

      384:n+4Q+SAN7uprgvM5OSUswZXg6ngbm4hfpFmRvR6JZlbw8hqIusZzZmn:n8OaxVUVRpcnuf

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks