General

  • Target

    Client.exe

  • Size

    31KB

  • Sample

    240319-zbfwwseg67

  • MD5

    2a4886693b72580bc327459b89dac363

  • SHA1

    20ccec81fc5cbe314b059f4c9dd6723ca0abf3ac

  • SHA256

    cd0031e6910db130c96a95d08c3ee1134bedad82a376c8905b8ac68c7150d0c3

  • SHA512

    2498b6dc496dd00bc909a896e08e4c4ad7467213929321e2853abe2c03ca770b5eae90417a19b805bb421e8408b7348766d431390ccd5e6674c9e287adb5cf70

  • SSDEEP

    768:Pdaxirnp7VJMzxn6zQJyRm3dPlvyYQmIDUu0ti4Oj:k0pKakJnQVk6j

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

group-w1ny (1):9999

Mutex

a265c84371f56d29c720630027828b9e

Attributes
  • reg_key

    a265c84371f56d29c720630027828b9e

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      Client.exe

    • Size

      31KB

    • MD5

      2a4886693b72580bc327459b89dac363

    • SHA1

      20ccec81fc5cbe314b059f4c9dd6723ca0abf3ac

    • SHA256

      cd0031e6910db130c96a95d08c3ee1134bedad82a376c8905b8ac68c7150d0c3

    • SHA512

      2498b6dc496dd00bc909a896e08e4c4ad7467213929321e2853abe2c03ca770b5eae90417a19b805bb421e8408b7348766d431390ccd5e6674c9e287adb5cf70

    • SSDEEP

      768:Pdaxirnp7VJMzxn6zQJyRm3dPlvyYQmIDUu0ti4Oj:k0pKakJnQVk6j

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Tasks