General

  • Target

    67da6f5ed1373b2d46cfd8f1e9201970.exe

  • Size

    359KB

  • Sample

    221203-jwjkhsbb8v

  • MD5

    67da6f5ed1373b2d46cfd8f1e9201970

  • SHA1

    1820da1f12be9f23a4de58bfb8d3bffc792b9754

  • SHA256

    74a6a6252fa238066d74712c4732b1d6dd517d8a7997ac366ae3f80f4e3aa2f4

  • SHA512

    a194c3f766b95a62fcf6927d0e90276f92a8b4c279fa3b882cecec7da3d380ce7882d4647e74e069f9b75149295ba90534897d757b00535f289201635308c787

  • SSDEEP

    6144:3jbeip2KAS0aEyBB+CMwQ8XCM66iO/PCWpBEaOltLKUPBXdRRLD1H5KPB:3uKAsEVC6qEJO/PdBQKGtpD1Zk

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

alka.ddns.net:4444

Mutex

610ba357edf3ec0f6e3dbbff929d8468

Attributes
  • reg_key

    610ba357edf3ec0f6e3dbbff929d8468

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      67da6f5ed1373b2d46cfd8f1e9201970.exe

    • Size

      359KB

    • MD5

      67da6f5ed1373b2d46cfd8f1e9201970

    • SHA1

      1820da1f12be9f23a4de58bfb8d3bffc792b9754

    • SHA256

      74a6a6252fa238066d74712c4732b1d6dd517d8a7997ac366ae3f80f4e3aa2f4

    • SHA512

      a194c3f766b95a62fcf6927d0e90276f92a8b4c279fa3b882cecec7da3d380ce7882d4647e74e069f9b75149295ba90534897d757b00535f289201635308c787

    • SSDEEP

      6144:3jbeip2KAS0aEyBB+CMwQ8XCM66iO/PCWpBEaOltLKUPBXdRRLD1H5KPB:3uKAsEVC6qEJO/PdBQKGtpD1Zk

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks