General

  • Target

    1224-55-0x00000000003F0000-0x00000000003FC000-memory.dmp

  • Size

    48KB

  • Sample

    230318-lm5shabg98

  • MD5

    bd208e6b7fdd8126bb9ca4156b812195

  • SHA1

    02f2da34bf3b3820015a9f34a1f587acbf316d3a

  • SHA256

    5b6d70ef9241d5b7916f92253c02c9d5f8b2f27601c58a843374f9fe7c7f24d9

  • SHA512

    df64ba8c051442bf03520d5453b57adb7dca33d1def7389f9aacebef7551675f4dfec9002c1feb57525d523e131dea16b5cf3493041b81984a4f97d01671c507

  • SSDEEP

    384:tweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZGR:SLq411eRpcnuZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

veprex.hopto.org:5552

Mutex

83b7e568a26ebaedf41a9c3879a1e2a8

Attributes
  • reg_key

    83b7e568a26ebaedf41a9c3879a1e2a8

  • splitter

    |'|'|

Targets

    • Target

      1224-55-0x00000000003F0000-0x00000000003FC000-memory.dmp

    • Size

      48KB

    • MD5

      bd208e6b7fdd8126bb9ca4156b812195

    • SHA1

      02f2da34bf3b3820015a9f34a1f587acbf316d3a

    • SHA256

      5b6d70ef9241d5b7916f92253c02c9d5f8b2f27601c58a843374f9fe7c7f24d9

    • SHA512

      df64ba8c051442bf03520d5453b57adb7dca33d1def7389f9aacebef7551675f4dfec9002c1feb57525d523e131dea16b5cf3493041b81984a4f97d01671c507

    • SSDEEP

      384:tweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZGR:SLq411eRpcnuZ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks