General

  • Target

    New Client.exe

  • Size

    214KB

  • Sample

    240104-xhtp8aghgq

  • MD5

    7ccd7ac0f9cb04a6760d3a4d6a919ba2

  • SHA1

    91b3acfc87e5adb43c440e8e9fc5700c0aa7948a

  • SHA256

    b2d371dd4e9dde0297cf4292a0b19f093b89e2e2b679458a28189115af82c1ea

  • SHA512

    78146807b04f37c65c4ee61897d01bdde40c35a84abba9e14b4b22397e361ebe70e271b0def323b718102201ed131f2daa6c56debdda7418d0ff510cfd5f3536

  • SSDEEP

    3072:fug0YNoN36txQviFCix4BnefWl9zdaF9blYvMaR:fbxO9zTvMaR

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

YT

C2

127.0.0.1:12107

Mutex

browser.exe

Attributes
  • reg_key

    browser.exe

  • splitter

    |Ghost|

Targets

    • Target

      New Client.exe

    • Size

      214KB

    • MD5

      7ccd7ac0f9cb04a6760d3a4d6a919ba2

    • SHA1

      91b3acfc87e5adb43c440e8e9fc5700c0aa7948a

    • SHA256

      b2d371dd4e9dde0297cf4292a0b19f093b89e2e2b679458a28189115af82c1ea

    • SHA512

      78146807b04f37c65c4ee61897d01bdde40c35a84abba9e14b4b22397e361ebe70e271b0def323b718102201ed131f2daa6c56debdda7418d0ff510cfd5f3536

    • SSDEEP

      3072:fug0YNoN36txQviFCix4BnefWl9zdaF9blYvMaR:fbxO9zTvMaR

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks