General

  • Target

    6658e474113c5241f9ad3b32ad7e6228

  • Size

    520KB

  • Sample

    240118-3r8tdsaaa2

  • MD5

    6658e474113c5241f9ad3b32ad7e6228

  • SHA1

    4466ee86ddafd15f05f6312e929f4875ebb25996

  • SHA256

    14396a942f7a0b580e799d6c15e281150a6c7f25a30a917bf445388058665f9e

  • SHA512

    d941d727aa4ef18a2661406ec75c1a54e65e308db90f95f10136aa6cf49286a8e37a7892bcde439282bc85b2da862834ef128ffe79d55da7cd8df0735c63c130

  • SSDEEP

    3072:7V/gcQgdWMlHEINo3vXbrFXIUyLu+n2SyTvcnrLi2DQXf:+JNMiI6fL5IBLu+D/e2Qf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

VICTIME

C2

med78520.no-ip.org:1604

Mutex

191da080f1cb6252fab9081030369fa6

Attributes
  • reg_key

    191da080f1cb6252fab9081030369fa6

  • splitter

    |'|'|

Targets

    • Target

      6658e474113c5241f9ad3b32ad7e6228

    • Size

      520KB

    • MD5

      6658e474113c5241f9ad3b32ad7e6228

    • SHA1

      4466ee86ddafd15f05f6312e929f4875ebb25996

    • SHA256

      14396a942f7a0b580e799d6c15e281150a6c7f25a30a917bf445388058665f9e

    • SHA512

      d941d727aa4ef18a2661406ec75c1a54e65e308db90f95f10136aa6cf49286a8e37a7892bcde439282bc85b2da862834ef128ffe79d55da7cd8df0735c63c130

    • SSDEEP

      3072:7V/gcQgdWMlHEINo3vXbrFXIUyLu+n2SyTvcnrLi2DQXf:+JNMiI6fL5IBLu+D/e2Qf

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks