General

  • Target

    1d6283a87158b72765a2ee1ad98f4fcfc66f3f00a689142bbb282d47965f9882

  • Size

    5KB

  • Sample

    230129-1ckrxade29

  • MD5

    2bffa215e8de32a499e70c7e8d2d2f49

  • SHA1

    b47e57184812b3c4f95a43be34fd5970d65ba699

  • SHA256

    1d6283a87158b72765a2ee1ad98f4fcfc66f3f00a689142bbb282d47965f9882

  • SHA512

    850480028421d66a8dafb1b80a4963a286a0c08d782fece10bd9b721b02b8726fb8ba98c0d58123b0fbea416fbad206aa4724ad50c7e94edeb3c7ce32eece420

  • SSDEEP

    48:68gsUyDFyChIYOwAFJ83LczguuGRFx955qBHLDAXulMDFHqXSfbNtm:mQyUOa3LMgQHx9Dkr1aDF5zNt

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Victime

C2

trip998877.hopto.org:1177

Mutex

a8e219248151eaf80194d2dc1b8a5945

Attributes
  • reg_key

    a8e219248151eaf80194d2dc1b8a5945

  • splitter

    |'|'|

Targets

    • Target

      1d6283a87158b72765a2ee1ad98f4fcfc66f3f00a689142bbb282d47965f9882

    • Size

      5KB

    • MD5

      2bffa215e8de32a499e70c7e8d2d2f49

    • SHA1

      b47e57184812b3c4f95a43be34fd5970d65ba699

    • SHA256

      1d6283a87158b72765a2ee1ad98f4fcfc66f3f00a689142bbb282d47965f9882

    • SHA512

      850480028421d66a8dafb1b80a4963a286a0c08d782fece10bd9b721b02b8726fb8ba98c0d58123b0fbea416fbad206aa4724ad50c7e94edeb3c7ce32eece420

    • SSDEEP

      48:68gsUyDFyChIYOwAFJ83LczguuGRFx955qBHLDAXulMDFHqXSfbNtm:mQyUOa3LMgQHx9Dkr1aDF5zNt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks