General

  • Target

    a8b04589810f09b2174ff2c934c2daa1.exe

  • Size

    69KB

  • Sample

    230512-cpz6csbd49

  • MD5

    a8b04589810f09b2174ff2c934c2daa1

  • SHA1

    d146e3319965745b2bf587321b8bcd07fd869e98

  • SHA256

    8e600aa009bd52af21dc58aad0f667bc6251ac26959ac8c3a9ad3b07c843e7d8

  • SHA512

    cb988ab3520f4ae85f39343aad0f7b62abd767b803b9503cc07550de96cdaec51dc4f1a8a4a7141c8424326266758966f44278163f98060aeb10616d7d26b42d

  • SSDEEP

    384:jTQ+SAN7uprgvM5OSUswZXg69gbm4hfpZmRvR6JZlbw8hqIusZzZZ+FK9Sjv:jkOaxVUvRpcnun09Sb

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

0.tcp.sa.ngrok.io:11856

Mutex

77dd3612cf32d44e269473290274f858

Attributes
  • reg_key

    77dd3612cf32d44e269473290274f858

  • splitter

    |'|'|

Targets

    • Target

      a8b04589810f09b2174ff2c934c2daa1.exe

    • Size

      69KB

    • MD5

      a8b04589810f09b2174ff2c934c2daa1

    • SHA1

      d146e3319965745b2bf587321b8bcd07fd869e98

    • SHA256

      8e600aa009bd52af21dc58aad0f667bc6251ac26959ac8c3a9ad3b07c843e7d8

    • SHA512

      cb988ab3520f4ae85f39343aad0f7b62abd767b803b9503cc07550de96cdaec51dc4f1a8a4a7141c8424326266758966f44278163f98060aeb10616d7d26b42d

    • SSDEEP

      384:jTQ+SAN7uprgvM5OSUswZXg69gbm4hfpZmRvR6JZlbw8hqIusZzZZ+FK9Sjv:jkOaxVUvRpcnun09Sb

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Command and Control

Web Service

1
T1102

Tasks