General

  • Target

    4c9712069db7e8568caed8023e3742676cc7aecda48ac6f2422ad6fefdd8c779

  • Size

    96KB

  • Sample

    221205-wc8fraeh4z

  • MD5

    2ca52f3cc07363063db01a026b273a80

  • SHA1

    a8428bf7a28e6c8daad18d4604c22ad4fe4eedf2

  • SHA256

    4c9712069db7e8568caed8023e3742676cc7aecda48ac6f2422ad6fefdd8c779

  • SHA512

    d9efc481fd07fc7bed353dfdb472b5ed06a64a64f60263380bc66ff5cfcbb8a16bbab0fec12e825e4d6d5765ba8be0f73ded53bf338cf85615c29e920502d700

  • SSDEEP

    1536:r1/F8CpxMCAgF9DLi+DOGL2NJJhVHYb9:JH2+DOGKJvs9

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

hkrooz

C2

hkrooz.no-ip.biz:999

Mutex

75b91df45b7ea5f1132228db5d247dde

Attributes
  • reg_key

    75b91df45b7ea5f1132228db5d247dde

  • splitter

    |'|'|

Targets

    • Target

      4c9712069db7e8568caed8023e3742676cc7aecda48ac6f2422ad6fefdd8c779

    • Size

      96KB

    • MD5

      2ca52f3cc07363063db01a026b273a80

    • SHA1

      a8428bf7a28e6c8daad18d4604c22ad4fe4eedf2

    • SHA256

      4c9712069db7e8568caed8023e3742676cc7aecda48ac6f2422ad6fefdd8c779

    • SHA512

      d9efc481fd07fc7bed353dfdb472b5ed06a64a64f60263380bc66ff5cfcbb8a16bbab0fec12e825e4d6d5765ba8be0f73ded53bf338cf85615c29e920502d700

    • SSDEEP

      1536:r1/F8CpxMCAgF9DLi+DOGL2NJJhVHYb9:JH2+DOGKJvs9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks