General

  • Target

    6d1db3cb8cbcc0467f8cc17a5ffb9381c759f3d9564f458a56e4215287b95ca9

  • Size

    273KB

  • Sample

    221130-psa2vsdg2y

  • MD5

    943dfdf0cb1cd51076480b836bd70601

  • SHA1

    38f473ac03dd3c9c1ff2b2230bc0e191f4d53050

  • SHA256

    6d1db3cb8cbcc0467f8cc17a5ffb9381c759f3d9564f458a56e4215287b95ca9

  • SHA512

    928cafbbd79f4419e5e543c55aa1d3dc4fcb58cb5242f10ada2de1a926ff558719e84e3b1aab0e42ed73bd7bfb587869f33f7f8ba72ec3b3ce572d5f5010e8b1

  • SSDEEP

    6144:at3aCHQiRgkktkhvgyFvatu6REsyzBaM577vWJeN1rj4:+qCwkgkktkhI8yY6Ral7/k

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

byuac

C2

queda2122.ddns.net:90

Mutex

ff62a63ef9ea27a176ace35d8efdbe51

Attributes
  • reg_key

    ff62a63ef9ea27a176ace35d8efdbe51

  • splitter

    |'|'|

Targets

    • Target

      6d1db3cb8cbcc0467f8cc17a5ffb9381c759f3d9564f458a56e4215287b95ca9

    • Size

      273KB

    • MD5

      943dfdf0cb1cd51076480b836bd70601

    • SHA1

      38f473ac03dd3c9c1ff2b2230bc0e191f4d53050

    • SHA256

      6d1db3cb8cbcc0467f8cc17a5ffb9381c759f3d9564f458a56e4215287b95ca9

    • SHA512

      928cafbbd79f4419e5e543c55aa1d3dc4fcb58cb5242f10ada2de1a926ff558719e84e3b1aab0e42ed73bd7bfb587869f33f7f8ba72ec3b3ce572d5f5010e8b1

    • SSDEEP

      6144:at3aCHQiRgkktkhvgyFvatu6REsyzBaM577vWJeN1rj4:+qCwkgkktkhI8yY6Ral7/k

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Tasks