General

  • Target

    4d27338e2470778785276e3668cf8e908bd6380a43ec2f86918f142914ffbe1b

  • Size

    68KB

  • Sample

    221128-xkxjwsha47

  • MD5

    ff45164f676306f9c20b07cfad8447cc

  • SHA1

    e8d4427ded9f9ab5c0e81c8f9755be4e3f825659

  • SHA256

    4d27338e2470778785276e3668cf8e908bd6380a43ec2f86918f142914ffbe1b

  • SHA512

    b87d0521b80108f37544f02c0d1fc86508268d710c0816a333b9ac2d6aff2a0bd5c22caaf8fa0eb2b3e8fc58f63b44f9c03898990b4dc8bf883ee433dbbac767

  • SSDEEP

    1536:n54ApY7ZQ+sy4w/ulGuFHty+jxOvtSKOLxj:nSuY7ZQ+sPwQGuFNy+N9Lxj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

sysfile

C2

23.105.131.200:9009

Mutex

b122495f64574a9d26e087a7e544dab3

Attributes
  • reg_key

    b122495f64574a9d26e087a7e544dab3

  • splitter

    |'|'|

Targets

    • Target

      4d27338e2470778785276e3668cf8e908bd6380a43ec2f86918f142914ffbe1b

    • Size

      68KB

    • MD5

      ff45164f676306f9c20b07cfad8447cc

    • SHA1

      e8d4427ded9f9ab5c0e81c8f9755be4e3f825659

    • SHA256

      4d27338e2470778785276e3668cf8e908bd6380a43ec2f86918f142914ffbe1b

    • SHA512

      b87d0521b80108f37544f02c0d1fc86508268d710c0816a333b9ac2d6aff2a0bd5c22caaf8fa0eb2b3e8fc58f63b44f9c03898990b4dc8bf883ee433dbbac767

    • SSDEEP

      1536:n54ApY7ZQ+sy4w/ulGuFHty+jxOvtSKOLxj:nSuY7ZQ+sPwQGuFNy+N9Lxj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks