General

  • Target

    25ce3e5e7542494839e7af1037d01b75.bin

  • Size

    16KB

  • Sample

    230722-bgrnkshc79

  • MD5

    b9e039b8880d400414ab8861d8945114

  • SHA1

    89c12e266d1cbc5f4197e0d2e7cf0949384c2261

  • SHA256

    d0d49c2dfb62d8221e5eb49b771b8be89eb7f247da52a233f5aeaa6abb031a31

  • SHA512

    506ff3b80ab074da45a45f2a70d059c07607474a05d265f41e15f0a2533087b5fe298b08af4e03d7422c252cefd1898ad1ff2100725ab537bd43b06832e32b9a

  • SSDEEP

    384:9+lZDCSTOQLae+jO4pFtHBXt1nMNU/7JEArCSFTeTduuge4Yc:I9OQLaeKO41DJtCeTcdjge47

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

lox

C2

6.tcp.eu.ngrok.io:16154

Mutex

bf3a4c0ea202ee07bb0bc0988c661a2a

Attributes
  • reg_key

    bf3a4c0ea202ee07bb0bc0988c661a2a

  • splitter

    |'|'|

Targets

    • Target

      e5540cffba128c0d852016d11e6e154445f83b146aee17a82e9f45ac876d10de.exe

    • Size

      37KB

    • MD5

      25ce3e5e7542494839e7af1037d01b75

    • SHA1

      a0a429037733f0d952d10fe2b17e86bfc91fad8e

    • SHA256

      e5540cffba128c0d852016d11e6e154445f83b146aee17a82e9f45ac876d10de

    • SHA512

      565398f500601bf5942897987414315bc4ddc0b980df24d672bfc0c2987ba7d1c4562e0cbb022bc8dce481202096d086d056987ba2b4c8fd66c262f8cbd7c0ce

    • SSDEEP

      384:6IDIUiFubK7FmpE8QyEfeyfZOfnSFtrAF+rMRTyN/0L+EcoinblneHQM3epzXiNw:9d2n8LEfeygvS3rM+rMRa8NuwKt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks