General

  • Target

    e295a10d1ae2f01ff66922cd13d950fb

  • Size

    395KB

  • Sample

    231220-tk74vaffgp

  • MD5

    e295a10d1ae2f01ff66922cd13d950fb

  • SHA1

    493ee29384a12b2f5dc13e9f6908b1f668c7b919

  • SHA256

    c4e071cd3249b9ec23ef43a02be817d48941fdc86a1870a648e1d23288eedec0

  • SHA512

    6c2365d04102b943b6a555c5882b70c3952a4840d7e81db2dcad74ee932a7c963db6c23948f072fce3cf950fda6f11691654f19977bd731c3abd9d363f69874c

  • SSDEEP

    12288:+RZ+IoG/n9IQxW3OBsze2X+t4RbeZcdm6LA8:I2G/nvxW3Wh0teZcdm4A8

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

6.tcp.ngrok.io:16860

Mutex

142514b06c5331e576c2b748ba1ec681

Attributes
  • reg_key

    142514b06c5331e576c2b748ba1ec681

  • splitter

    |'|'|

Targets

    • Target

      e295a10d1ae2f01ff66922cd13d950fb

    • Size

      395KB

    • MD5

      e295a10d1ae2f01ff66922cd13d950fb

    • SHA1

      493ee29384a12b2f5dc13e9f6908b1f668c7b919

    • SHA256

      c4e071cd3249b9ec23ef43a02be817d48941fdc86a1870a648e1d23288eedec0

    • SHA512

      6c2365d04102b943b6a555c5882b70c3952a4840d7e81db2dcad74ee932a7c963db6c23948f072fce3cf950fda6f11691654f19977bd731c3abd9d363f69874c

    • SSDEEP

      12288:+RZ+IoG/n9IQxW3OBsze2X+t4RbeZcdm6LA8:I2G/nvxW3Wh0teZcdm4A8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks