General

  • Target

    bK7E.exe

  • Size

    23KB

  • Sample

    230317-dmwwlagb2s

  • MD5

    888dcdd4e1306865e2ef687ae5bd4a04

  • SHA1

    f2fa50dbb9727b7c28ad588098cd398d09fb507b

  • SHA256

    d27949f622083d799ba2f49e3a7039be4e57094ba7fcba635d028f269522007d

  • SHA512

    14fca0968894f73eb1a33e1359b7f5dbdf386aeb782ccef286f138e39cd31cd91b01622e42a8270049944c5a4aae7616a5ed91d9ca216f49e98917cee1fb42fa

  • SSDEEP

    384:QoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMdJ:f7O89p2rRpcnu/J

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

0.tcp.ngrok.io:17506

Mutex

db4fd7d140aa221059113328d0539f84

Attributes
  • reg_key

    db4fd7d140aa221059113328d0539f84

  • splitter

    |'|'|

Targets

    • Target

      bK7E.exe

    • Size

      23KB

    • MD5

      888dcdd4e1306865e2ef687ae5bd4a04

    • SHA1

      f2fa50dbb9727b7c28ad588098cd398d09fb507b

    • SHA256

      d27949f622083d799ba2f49e3a7039be4e57094ba7fcba635d028f269522007d

    • SHA512

      14fca0968894f73eb1a33e1359b7f5dbdf386aeb782ccef286f138e39cd31cd91b01622e42a8270049944c5a4aae7616a5ed91d9ca216f49e98917cee1fb42fa

    • SSDEEP

      384:QoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMdJ:f7O89p2rRpcnu/J

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Command and Control

Web Service

1
T1102

Tasks