General

  • Target

    56adfb1405dcba693c73ba64a9d1c463.exe

  • Size

    93KB

  • Sample

    230321-bz9bcagc47

  • MD5

    56adfb1405dcba693c73ba64a9d1c463

  • SHA1

    294664d8ebda0f36572a1fb44c84a1df55376493

  • SHA256

    889a5de641983dcca6e2a91b1442812e84fd17821c7117f965f751bea5eb4067

  • SHA512

    9a5b362929702907913f4caf50a02c876307731b4ed97252b9196eaafa6b4ae39f1198d0f0d46b8bcdc257336636dcdac20a8cc57d9c7f9705b9e1f982b2cd65

  • SSDEEP

    1536:ZerkVbPGHz88Ebb1pjEwzGi1dDXBDrgS:ZekPGHzmf1mi1drxk

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

lox

C2

YWxyZWFkeS1oZXJlaW4uYXQucGx5Lmdn:NTgxNTg=

Mutex

7585b9138af20fd06384c70df526bb85

Attributes
  • reg_key

    7585b9138af20fd06384c70df526bb85

  • splitter

    |'|'|

Targets

    • Target

      56adfb1405dcba693c73ba64a9d1c463.exe

    • Size

      93KB

    • MD5

      56adfb1405dcba693c73ba64a9d1c463

    • SHA1

      294664d8ebda0f36572a1fb44c84a1df55376493

    • SHA256

      889a5de641983dcca6e2a91b1442812e84fd17821c7117f965f751bea5eb4067

    • SHA512

      9a5b362929702907913f4caf50a02c876307731b4ed97252b9196eaafa6b4ae39f1198d0f0d46b8bcdc257336636dcdac20a8cc57d9c7f9705b9e1f982b2cd65

    • SSDEEP

      1536:ZerkVbPGHz88Ebb1pjEwzGi1dDXBDrgS:ZekPGHzmf1mi1drxk

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks