General

  • Target

    ca2ff13c2cffca5507ddd42ccaa397be.bin

  • Size

    11KB

  • Sample

    230321-b9cp5aac71

  • MD5

    0d2ec9c230639f5609707234e191af44

  • SHA1

    bdf2752511975f15925346c41b93cd7bcfef22b7

  • SHA256

    985764bc71f6e20e5402b1bd5eab0fa9213436aea896cea2965973fe80a84d1c

  • SHA512

    7626eef7d9d00f3809a42ad180d55d27e60262029f60ced04fcd9f470975a16ad3475781a3ef9f6621b50311377ba0512c8904d28dd8d25b8d65fde671216085

  • SSDEEP

    192:OuRnzQWQzbz+Vl+SqeZQi1jZbEMJnHSoB6HCA3ePgWs71J4h++TN0UQEiZKcKoj+:NzKbq2bef1FEMJycWjp71mE+T8zrKN

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

2.tcp.ngrok.io:16052

Mutex

63155354d9df6bd69c496aff0dac1e22

Attributes
  • reg_key

    63155354d9df6bd69c496aff0dac1e22

  • splitter

    |'|'|

Targets

    • Target

      e235fa50b2fd6764c53eacb33714815824f4d0448fd5c6ac5ff6d6877eb66891.exe

    • Size

      23KB

    • MD5

      ca2ff13c2cffca5507ddd42ccaa397be

    • SHA1

      14785a8b6d0296fa41814c2e11818e5ca0d4352d

    • SHA256

      e235fa50b2fd6764c53eacb33714815824f4d0448fd5c6ac5ff6d6877eb66891

    • SHA512

      6c48d2cb6d4ac8137cb8d6d13df1439557b9d95921d0872af8169940c2fb58ef740fa7ff3fb0935f9b32a9c6943e93cb38fa6def62cb65ce4efd99ecad6a7db7

    • SSDEEP

      384:XoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZ2B:w7O89p2rRpcnuZ

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Command and Control

Web Service

1
T1102

Tasks