General

  • Target

    065f36f725a9858554efecf5a384841a83ba4bf1e05c2c4ac171278ba712df27

  • Size

    23KB

  • Sample

    221128-b1y7rseb35

  • MD5

    d193426498b15037d1d0260d07b8c92b

  • SHA1

    6898f0b20ded1a9189fe8ada98afccc6ea5f1c62

  • SHA256

    065f36f725a9858554efecf5a384841a83ba4bf1e05c2c4ac171278ba712df27

  • SHA512

    43bcf1c55b9cd0f8a2c320c42f1f47dc5e566c4a13c9909f76d3fddace4300725f9780a6b3695b706f7e4b29a697b6382a8c40d1869e8a4b309105c29bb8c027

  • SSDEEP

    384:2c6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZTJ9:ue9EJLN/yRpcnuM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

XXXXXX

C2

fjdhyuz.zapto.org:5552

Mutex

57bb70087e99c06759f29a60a93b41f1

Attributes
  • reg_key

    57bb70087e99c06759f29a60a93b41f1

  • splitter

    |'|'|

Targets

    • Target

      065f36f725a9858554efecf5a384841a83ba4bf1e05c2c4ac171278ba712df27

    • Size

      23KB

    • MD5

      d193426498b15037d1d0260d07b8c92b

    • SHA1

      6898f0b20ded1a9189fe8ada98afccc6ea5f1c62

    • SHA256

      065f36f725a9858554efecf5a384841a83ba4bf1e05c2c4ac171278ba712df27

    • SHA512

      43bcf1c55b9cd0f8a2c320c42f1f47dc5e566c4a13c9909f76d3fddace4300725f9780a6b3695b706f7e4b29a697b6382a8c40d1869e8a4b309105c29bb8c027

    • SSDEEP

      384:2c6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZTJ9:ue9EJLN/yRpcnuM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks