General

  • Target

    c1fe9d30d0e68db7d12e51b84cc7c5ec.exe

  • Size

    108KB

  • Sample

    230612-btjhqsad74

  • MD5

    c1fe9d30d0e68db7d12e51b84cc7c5ec

  • SHA1

    4aeb621755a1fa628e29551fbcaedaf4905b22e3

  • SHA256

    d91ce4d753b5d0c4a80fc837d83b9c2ddbb49a22f70536e9e7c23f395e3e45ef

  • SHA512

    c2ae3cfaf477290dc24859e69019a2016ff9ba3de3287bdc43ad6797f0847d053b17770f5276a8065fc88e2cae90fefe997189fe75e90b5cef53c451bef8c612

  • SSDEEP

    1536:t+7kVbPGHz88EbE1pjEwzGi1dDxD/gSh+u:t+0PGHzmI1mi1d1Y

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

5.tcp.eu.ngrok.io:13266

Mutex

c165200ef8d2ffdfc7fed74e6ae6556d

Attributes
  • reg_key

    c165200ef8d2ffdfc7fed74e6ae6556d

  • splitter

    |'|'|

Targets

    • Target

      c1fe9d30d0e68db7d12e51b84cc7c5ec.exe

    • Size

      108KB

    • MD5

      c1fe9d30d0e68db7d12e51b84cc7c5ec

    • SHA1

      4aeb621755a1fa628e29551fbcaedaf4905b22e3

    • SHA256

      d91ce4d753b5d0c4a80fc837d83b9c2ddbb49a22f70536e9e7c23f395e3e45ef

    • SHA512

      c2ae3cfaf477290dc24859e69019a2016ff9ba3de3287bdc43ad6797f0847d053b17770f5276a8065fc88e2cae90fefe997189fe75e90b5cef53c451bef8c612

    • SSDEEP

      1536:t+7kVbPGHz88EbE1pjEwzGi1dDxD/gSh+u:t+0PGHzmI1mi1d1Y

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks