General

  • Target

    440C7BE71CBF8CCDEA42449F4B0FA4AEEF078B59B17FC.exe

  • Size

    31KB

  • Sample

    230824-qhwfgscg28

  • MD5

    14874a9249876def878e006ca55ef5e5

  • SHA1

    82839c360cee6b8cee93297231d7f98d976fb65f

  • SHA256

    440c7be71cbf8ccdea42449f4b0fa4aeef078b59b17fc95851ba0544ab1a577a

  • SHA512

    70f441ec37dc3bb32a84d8c838225aa67ac4205907ee87bd377e4f1cbdcb256d61182ee2a6dcee28f1910dddbbebc12c4c476a7f206e335a1d9c4a855198bac9

  • SSDEEP

    768:oN8p5d5rLmzxBuJJKye8nu4LPv67QmIDUu0tibSj:zvKO+4jwQVkLj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

system

C2

147.50.253.241:6522

Mutex

e4d8b898672502b9751c26f7a748bd76

Attributes
  • reg_key

    e4d8b898672502b9751c26f7a748bd76

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      440C7BE71CBF8CCDEA42449F4B0FA4AEEF078B59B17FC.exe

    • Size

      31KB

    • MD5

      14874a9249876def878e006ca55ef5e5

    • SHA1

      82839c360cee6b8cee93297231d7f98d976fb65f

    • SHA256

      440c7be71cbf8ccdea42449f4b0fa4aeef078b59b17fc95851ba0544ab1a577a

    • SHA512

      70f441ec37dc3bb32a84d8c838225aa67ac4205907ee87bd377e4f1cbdcb256d61182ee2a6dcee28f1910dddbbebc12c4c476a7f206e335a1d9c4a855198bac9

    • SSDEEP

      768:oN8p5d5rLmzxBuJJKye8nu4LPv67QmIDUu0tibSj:zvKO+4jwQVkLj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Discovery

System Information Discovery

1
T1082

Tasks