General

  • Target

    bK7F.exe

  • Size

    23KB

  • Sample

    230317-fsxfesgd5y

  • MD5

    59645ca85405fac3881899a293149272

  • SHA1

    a6fe815e16b0f0dbec37b553ec1d7ff4ac97f08f

  • SHA256

    546d7be50a9f2e5172fe46d3e20031f8d743d1f1cca29a432dfa3df9d109e292

  • SHA512

    ea3ff11fcad38c916a0b7c5266f9eaa69ff0d8bd36e9b1a768b407a70b32460d3d80e1b068c82e3981a6fb399a8fac02b2b914493df5ad7900627d6b27ee62e1

  • SSDEEP

    384:3oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMo:Q7O89p2rRpcnu6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

0.tcp.ngrok.io:17506

Mutex

db4fd7d140aa221059113328d0539f84

Attributes
  • reg_key

    db4fd7d140aa221059113328d0539f84

  • splitter

    |'|'|

Targets

    • Target

      bK7F.exe

    • Size

      23KB

    • MD5

      59645ca85405fac3881899a293149272

    • SHA1

      a6fe815e16b0f0dbec37b553ec1d7ff4ac97f08f

    • SHA256

      546d7be50a9f2e5172fe46d3e20031f8d743d1f1cca29a432dfa3df9d109e292

    • SHA512

      ea3ff11fcad38c916a0b7c5266f9eaa69ff0d8bd36e9b1a768b407a70b32460d3d80e1b068c82e3981a6fb399a8fac02b2b914493df5ad7900627d6b27ee62e1

    • SSDEEP

      384:3oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMo:Q7O89p2rRpcnu6

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Command and Control

Web Service

1
T1102

Tasks