General

  • Target

    1244-56-0x00000000003E0000-0x00000000003EA000-memory.dmp

  • Size

    40KB

  • Sample

    230207-bx2tgsca7z

  • MD5

    54804479a9d505013067bc3fa5de1d98

  • SHA1

    99d0ae239cb09cc78c996d6db6a01ef37bca2866

  • SHA256

    47ef8a83ff586e9eb82f68c7095b8d1470cdea4ed03c7eeb102508cbfe4f06f1

  • SHA512

    d6152f8f7eb197d36bac30f06a566dedfbbd1364bb4e82fcaded058ea4cd376f469fed18a53c8df55e222298768e17cc6734a93e07cd3ed420c615f2d607f3ff

  • SSDEEP

    384:8Pwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZfB:8ETbC81NgRpcnu+

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

gololosd.ddns.net:9090

Mutex

151fd47f794ef2318b946b794bcd6603

Attributes
  • reg_key

    151fd47f794ef2318b946b794bcd6603

  • splitter

    |'|'|

Targets

    • Target

      1244-56-0x00000000003E0000-0x00000000003EA000-memory.dmp

    • Size

      40KB

    • MD5

      54804479a9d505013067bc3fa5de1d98

    • SHA1

      99d0ae239cb09cc78c996d6db6a01ef37bca2866

    • SHA256

      47ef8a83ff586e9eb82f68c7095b8d1470cdea4ed03c7eeb102508cbfe4f06f1

    • SHA512

      d6152f8f7eb197d36bac30f06a566dedfbbd1364bb4e82fcaded058ea4cd376f469fed18a53c8df55e222298768e17cc6734a93e07cd3ed420c615f2d607f3ff

    • SSDEEP

      384:8Pwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZfB:8ETbC81NgRpcnu+

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks