General

  • Target

    a5e656cedb3fe0dfc90d3840add5669385e8d60347a9a47ca697beb4c6b871d8

  • Size

    29KB

  • Sample

    221205-ycvwrsch5v

  • MD5

    3490a3125771a2ddd8d9d633be4201b0

  • SHA1

    134db4d28672703ca6670b3f8d8823b1b1f877fe

  • SHA256

    a5e656cedb3fe0dfc90d3840add5669385e8d60347a9a47ca697beb4c6b871d8

  • SHA512

    96ecf261d86f97cc0b091cc01ff109ece03bbbbbf20cdf00fb50b6f1024ffc966602bf20b1ada0f802c616c0797276e5afbfe0e6a488391d787e10a0fa15f0d2

  • SSDEEP

    384:CPqvANl7TxTD+VF2dbofPauxnaIuN15708COmqDk9jeHqGBsbh0w4wlAokw9Ohgd:5u75oa4fuTC8cqojeVBKh0p29SgRTn

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Stiva

C2

stivadns.zapto.org:1177

Mutex

c628feb012b1a51cfd51ff0ba11260eb

Attributes
  • reg_key

    c628feb012b1a51cfd51ff0ba11260eb

  • splitter

    |'|'|

Targets

    • Target

      a5e656cedb3fe0dfc90d3840add5669385e8d60347a9a47ca697beb4c6b871d8

    • Size

      29KB

    • MD5

      3490a3125771a2ddd8d9d633be4201b0

    • SHA1

      134db4d28672703ca6670b3f8d8823b1b1f877fe

    • SHA256

      a5e656cedb3fe0dfc90d3840add5669385e8d60347a9a47ca697beb4c6b871d8

    • SHA512

      96ecf261d86f97cc0b091cc01ff109ece03bbbbbf20cdf00fb50b6f1024ffc966602bf20b1ada0f802c616c0797276e5afbfe0e6a488391d787e10a0fa15f0d2

    • SSDEEP

      384:CPqvANl7TxTD+VF2dbofPauxnaIuN15708COmqDk9jeHqGBsbh0w4wlAokw9Ohgd:5u75oa4fuTC8cqojeVBKh0p29SgRTn

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks