General

  • Target

    0552f81dac0204225b13c3b096b8f29bc89e221b9245cb893e7af31869314939

  • Size

    6.6MB

  • Sample

    230129-x7qd4aah74

  • MD5

    4fa298a31dcb76657128b92350a0234e

  • SHA1

    29ad9d23a2fd10a697cd0128edec56803f29a1bb

  • SHA256

    0552f81dac0204225b13c3b096b8f29bc89e221b9245cb893e7af31869314939

  • SHA512

    7095b26dccf45ac0eea02a4b6ac3ce0812cc74818338cb171656d73886c3c0e38a8066e19390dd507df3b10dc14a72f18f655f300d959515fb92c406de798cec

  • SSDEEP

    196608:gb01x9LY/k8a+Le9jrv4b9YR4zLD+sfFxBgYirXGVafo:gb0f902BqiR4Dd7iYag

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

loveuo11222.ddns.net:5552

Mutex

edf49507d18aa53c7edda61c9c878fa0

Attributes
  • reg_key

    edf49507d18aa53c7edda61c9c878fa0

  • splitter

    |'|'|

Extracted

Family

revengerat

Mutex

Targets

    • Target

      0552f81dac0204225b13c3b096b8f29bc89e221b9245cb893e7af31869314939

    • Size

      6.6MB

    • MD5

      4fa298a31dcb76657128b92350a0234e

    • SHA1

      29ad9d23a2fd10a697cd0128edec56803f29a1bb

    • SHA256

      0552f81dac0204225b13c3b096b8f29bc89e221b9245cb893e7af31869314939

    • SHA512

      7095b26dccf45ac0eea02a4b6ac3ce0812cc74818338cb171656d73886c3c0e38a8066e19390dd507df3b10dc14a72f18f655f300d959515fb92c406de798cec

    • SSDEEP

      196608:gb01x9LY/k8a+Le9jrv4b9YR4zLD+sfFxBgYirXGVafo:gb0f902BqiR4Dd7iYag

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • RevengeRat Executable

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks