General

  • Target

    6f895f89e7d068822ab596e46d0a4c90.bin

  • Size

    12KB

  • Sample

    230516-bptg5shd61

  • MD5

    370fce1c0289b3a3eac62916cb7fe9d2

  • SHA1

    6e6ea383869f0e3721a1133f5dfd1ae9c9f28e8a

  • SHA256

    437476587e089d1b66a3b2b5daa8da413bda83a9aba17bb9ee5caaf6e0524dcc

  • SHA512

    630def6ba2d85bdcfc386f302d76bfb4c680316faeaddf5523fcfac65d9311a8bab2ce4904d31a64535490dd2348dd50bda81f5d745cd7bc884246ff5a55ca1f

  • SSDEEP

    192:lZIIlJQtWmelsi7dluQJf7SuO2AF1gxdrg1I3ZQl59vvbKR8Hzci070El:/IIlJ42s288zQdF+H8EQH1vuOd07Fl

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

Victem

C2

mission-panels.at.ply.gg :16710

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      95bc40fb1956b0c98080dfc8792f3c0300546021066fc1826c089b5e3fdd6dc7.exe

    • Size

      27KB

    • MD5

      6f895f89e7d068822ab596e46d0a4c90

    • SHA1

      aedbe37fcf0ce06da60979e2315a7138892509a8

    • SHA256

      95bc40fb1956b0c98080dfc8792f3c0300546021066fc1826c089b5e3fdd6dc7

    • SHA512

      90ad530660327b40ca8f9a0fc0a6d82d6ffb74ecaae771325e0ed72e38f5fb03dbcea82b98fa28c003c3bbef6ca02bab051e210f72af8e3d4e098e394df6c929

    • SSDEEP

      384:DLBFYTmgEJbzgr2KGbPxZh7M9AQk93vmhm7UMKmIEecKdbXTzm9bVhcaUo6or6eR:H/dfEj9A/vMHTi9bDU

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks