General

  • Target

    4c0ea2e9d02738b568a654d6eac8de4725fd09df22ee62e200dcaf6202a9d42d

  • Size

    29KB

  • Sample

    221204-scjkvadf4t

  • MD5

    11ef3d97079782832221384140891230

  • SHA1

    f1ea22af601045d1b4f46ddaddd07a07b878ecf6

  • SHA256

    4c0ea2e9d02738b568a654d6eac8de4725fd09df22ee62e200dcaf6202a9d42d

  • SHA512

    06e13b9f9e2ae38fc280c30922ecdb79e15e16516334341ec25e5fc301d5a79091217ea4410e7a8263520c8424ce1826f99a6916481b3e49e8657cf8f0e37c22

  • SSDEEP

    384:5yotl7bJdYQwiJYYHt5PgjmOmqDoFE4eoKGBsbh0w4wlAokw9OhgOL1vYRGOZz7E:P7/YQwiNGjAqc3eYBKh0p29SgRdu

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed By The Bl@ck Ghost

C2

127.0.0.1:1177

Mutex

12ce4e06a81e8d54fd01d9b762f1b1bb

Attributes
  • reg_key

    12ce4e06a81e8d54fd01d9b762f1b1bb

  • splitter

    |'|'|

Targets

    • Target

      4c0ea2e9d02738b568a654d6eac8de4725fd09df22ee62e200dcaf6202a9d42d

    • Size

      29KB

    • MD5

      11ef3d97079782832221384140891230

    • SHA1

      f1ea22af601045d1b4f46ddaddd07a07b878ecf6

    • SHA256

      4c0ea2e9d02738b568a654d6eac8de4725fd09df22ee62e200dcaf6202a9d42d

    • SHA512

      06e13b9f9e2ae38fc280c30922ecdb79e15e16516334341ec25e5fc301d5a79091217ea4410e7a8263520c8424ce1826f99a6916481b3e49e8657cf8f0e37c22

    • SSDEEP

      384:5yotl7bJdYQwiJYYHt5PgjmOmqDoFE4eoKGBsbh0w4wlAokw9OhgOL1vYRGOZz7E:P7/YQwiNGjAqc3eYBKh0p29SgRdu

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks