General

  • Target

    NEAS.8955098f1b1c57da1df80af66914bb7f9eee468ca8199e23a0415e1bbe8ad339exe.exe

  • Size

    93KB

  • Sample

    231204-t52skada32

  • MD5

    18629444d2e20b32df0c82d841a62932

  • SHA1

    ec89a43abc1042e3633fc2fced4e5b124e1ac21e

  • SHA256

    8955098f1b1c57da1df80af66914bb7f9eee468ca8199e23a0415e1bbe8ad339

  • SHA512

    11687ab89f3f837f7e7b838cf15d80bb1614386072263f8a65dee4508a96241b8ba009edd1d87d02076048fa692c332b40804c3db4705c547bced5ad3e95416a

  • SSDEEP

    768:HY3repD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3LsGT:6eLOx6baIa9RPj00ljEwzGi1dD3DfgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

7.tcp.eu.ngrok.io:14627

Mutex

53a45de85575719ff2b4dac083ed4905

Attributes
  • reg_key

    53a45de85575719ff2b4dac083ed4905

  • splitter

    |'|'|

Targets

    • Target

      NEAS.8955098f1b1c57da1df80af66914bb7f9eee468ca8199e23a0415e1bbe8ad339exe.exe

    • Size

      93KB

    • MD5

      18629444d2e20b32df0c82d841a62932

    • SHA1

      ec89a43abc1042e3633fc2fced4e5b124e1ac21e

    • SHA256

      8955098f1b1c57da1df80af66914bb7f9eee468ca8199e23a0415e1bbe8ad339

    • SHA512

      11687ab89f3f837f7e7b838cf15d80bb1614386072263f8a65dee4508a96241b8ba009edd1d87d02076048fa692c332b40804c3db4705c547bced5ad3e95416a

    • SSDEEP

      768:HY3repD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3LsGT:6eLOx6baIa9RPj00ljEwzGi1dD3DfgS

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks