General

  • Target

    wearaawr.exe

  • Size

    93KB

  • Sample

    230329-d4r9qsee95

  • MD5

    63f06efdbe1f93b7a2688a0baf2256d4

  • SHA1

    91d9cc6369d885534cfa7eea162964bc06c00b2b

  • SHA256

    7caf8f81caea74f0a583349fc9f4f96e9226c913a7cb9f2dbca87050ae595e84

  • SHA512

    a0137176f42d908d09bb96d74aef630bcb50b42a64c6763945b42e0ef9f159c05bd8b468320b1c6f248e8591e23a27edf5f7c17bb32342d1eb9744667ed196b1

  • SSDEEP

    1536:CIaw0gMX6BbNrnYjS7JjEwzGi1dDxDbgS:CIwX6BbNraS7Gi1d1U

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

FRANSESCOTI3LjAuFRANSESCOC4x:MzE0OQ==

Mutex

1e837d763a164123719a02065b1e7b81

Attributes
  • reg_key

    1e837d763a164123719a02065b1e7b81

  • splitter

    |'|'|

Targets

    • Target

      wearaawr.exe

    • Size

      93KB

    • MD5

      63f06efdbe1f93b7a2688a0baf2256d4

    • SHA1

      91d9cc6369d885534cfa7eea162964bc06c00b2b

    • SHA256

      7caf8f81caea74f0a583349fc9f4f96e9226c913a7cb9f2dbca87050ae595e84

    • SHA512

      a0137176f42d908d09bb96d74aef630bcb50b42a64c6763945b42e0ef9f159c05bd8b468320b1c6f248e8591e23a27edf5f7c17bb32342d1eb9744667ed196b1

    • SSDEEP

      1536:CIaw0gMX6BbNrnYjS7JjEwzGi1dDxDbgS:CIwX6BbNraS7Gi1d1U

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks