General

  • Target

    a26afc4b230cde67dec5e341aef0e90f

  • Size

    4.5MB

  • Sample

    230316-brvszsgc66

  • MD5

    a26afc4b230cde67dec5e341aef0e90f

  • SHA1

    f5a7a08bbd039184c3e89f4ea4ef5eeb392b5fa1

  • SHA256

    567c4101aa7ad812b7bd42d87a5ba7d9c4f82dd7096daa7b079cfa70649dec2e

  • SHA512

    06e71d53d1e0e0436be193f05c05c8896e9184bfc7db1842195452d34a8c9a59f26b38129a4216eb301c96e367babb8db7b1e50b2a258acc5f0d6c981db4621a

  • SSDEEP

    98304:13KI5OVU8/GsW+exVVxHjkxuiCllBHr8wBY:8Q+Urt+eHVxHjqui+r8AY

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

HacKed

C2

ecutuning.ddns.net:11560

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      a26afc4b230cde67dec5e341aef0e90f

    • Size

      4.5MB

    • MD5

      a26afc4b230cde67dec5e341aef0e90f

    • SHA1

      f5a7a08bbd039184c3e89f4ea4ef5eeb392b5fa1

    • SHA256

      567c4101aa7ad812b7bd42d87a5ba7d9c4f82dd7096daa7b079cfa70649dec2e

    • SHA512

      06e71d53d1e0e0436be193f05c05c8896e9184bfc7db1842195452d34a8c9a59f26b38129a4216eb301c96e367babb8db7b1e50b2a258acc5f0d6c981db4621a

    • SSDEEP

      98304:13KI5OVU8/GsW+exVVxHjkxuiCllBHr8wBY:8Q+Urt+eHVxHjqui+r8AY

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks