General

  • Target

    0x00090000000122d2-63.dat

  • Size

    93KB

  • Sample

    230412-avsmcsaa3z

  • MD5

    cc76ed0071839745cf308c6b1dc8bb29

  • SHA1

    d7054bdd27631e80dbc8dcaa6d7caaaf5eee4bb3

  • SHA256

    a0b674330aebe1d3fad407cea0c7f28a5036ef28e09c593323772239afffb0f8

  • SHA512

    3b07fb470a9e9acf650b208a65093688c9f82962bb21f841f8f515323b4c20f38023f0af7594bd4f7f0d2a50942413c5ada81fd0b53e4d4b1854760aa6ef5260

  • SSDEEP

    1536:2CS7kVbPGHz88Eb71pjEwzGi1dDQDPgS:2CS0PGHzmP1mi1dOo

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

OC50Y3Aubmdyb2suaW8Strik:MTIxOTg=

Mutex

2269ad1ab98824fd02bd4a888a5d5cc6

Attributes
  • reg_key

    2269ad1ab98824fd02bd4a888a5d5cc6

  • splitter

    |'|'|

Targets

    • Target

      0x00090000000122d2-63.dat

    • Size

      93KB

    • MD5

      cc76ed0071839745cf308c6b1dc8bb29

    • SHA1

      d7054bdd27631e80dbc8dcaa6d7caaaf5eee4bb3

    • SHA256

      a0b674330aebe1d3fad407cea0c7f28a5036ef28e09c593323772239afffb0f8

    • SHA512

      3b07fb470a9e9acf650b208a65093688c9f82962bb21f841f8f515323b4c20f38023f0af7594bd4f7f0d2a50942413c5ada81fd0b53e4d4b1854760aa6ef5260

    • SSDEEP

      1536:2CS7kVbPGHz88Eb71pjEwzGi1dDQDPgS:2CS0PGHzmP1mi1dOo

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Command and Control

Web Service

1
T1102

Tasks