General

  • Target

    0C6648FD9A49C1A11E04F31D444CA6B5FA009459559F2.exe

  • Size

    26KB

  • Sample

    230402-284qbsch6x

  • MD5

    9ed07382a06bf2f0381b8f2bdc42a94d

  • SHA1

    4beb3a4798b0ac1508c2a71f5d46dfb60099a722

  • SHA256

    0c6648fd9a49c1a11e04f31d444ca6b5fa009459559f2b88bc51f90f938b44df

  • SHA512

    c45893ae081e2a800fd06e1f0e0ac09b0b4c064dbf888d4d051d5a0706e66cbb7f772c169e35fe75f14fdd3cee7107b0f0ae2efd5e7712d584e5d5e3fe959a41

  • SSDEEP

    384:lL1M2XwBNOaLNOFs/Av2yeCP1BBvMo7AQk93vmhm7UMKmIEecKdbXTzm9bVhcaVd:le220U0Wo7A/vMHTi9bD

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

HacKed

C2

ecutuning.ddns.net:11560

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      0C6648FD9A49C1A11E04F31D444CA6B5FA009459559F2.exe

    • Size

      26KB

    • MD5

      9ed07382a06bf2f0381b8f2bdc42a94d

    • SHA1

      4beb3a4798b0ac1508c2a71f5d46dfb60099a722

    • SHA256

      0c6648fd9a49c1a11e04f31d444ca6b5fa009459559f2b88bc51f90f938b44df

    • SHA512

      c45893ae081e2a800fd06e1f0e0ac09b0b4c064dbf888d4d051d5a0706e66cbb7f772c169e35fe75f14fdd3cee7107b0f0ae2efd5e7712d584e5d5e3fe959a41

    • SSDEEP

      384:lL1M2XwBNOaLNOFs/Av2yeCP1BBvMo7AQk93vmhm7UMKmIEecKdbXTzm9bVhcaVd:le220U0Wo7A/vMHTi9bD

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks