General

  • Target

    Client.exe

  • Size

    31KB

  • Sample

    240319-1nrplage98

  • MD5

    9b4e8d0818369598a1e6f0d95626aa7c

  • SHA1

    53f8b19c71a37de32961ec6c9894dab49aa15b9c

  • SHA256

    b66c6d759561ea7d58f2cf47a8152062bc91ce5e0586f268dcd1b80a318ee82e

  • SHA512

    88126f0f577e07d05cc6e5b052b3c70a83c2151d0f9a58b4eb6392677b8fecc812bb5544202388b500cf82f3f02a6831d394c4c95b5581602609d0d3f5480c7e

  • SSDEEP

    768:YGMv+ZW1nRNAzx7SnI1OfoFLhvi0QmIDUu0tiRYj:ZMS2a9RLQVkrj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

group-ksmdoe (1):9999

Mutex

456e701df4ad199ed16d5e1d6dc4ead9

Attributes
  • reg_key

    456e701df4ad199ed16d5e1d6dc4ead9

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      Client.exe

    • Size

      31KB

    • MD5

      9b4e8d0818369598a1e6f0d95626aa7c

    • SHA1

      53f8b19c71a37de32961ec6c9894dab49aa15b9c

    • SHA256

      b66c6d759561ea7d58f2cf47a8152062bc91ce5e0586f268dcd1b80a318ee82e

    • SHA512

      88126f0f577e07d05cc6e5b052b3c70a83c2151d0f9a58b4eb6392677b8fecc812bb5544202388b500cf82f3f02a6831d394c4c95b5581602609d0d3f5480c7e

    • SSDEEP

      768:YGMv+ZW1nRNAzx7SnI1OfoFLhvi0QmIDUu0tiRYj:ZMS2a9RLQVkrj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Tasks