General

  • Target

    af8fd5644cdd7ebbc3ed179352923760e6950c633a6a322d628191ab2e9a64aa

  • Size

    425KB

  • Sample

    240420-byxadsch97

  • MD5

    806051b6314f9755dec606f8d6955eb4

  • SHA1

    7e2dbf2455bcca31dfe5193f01d7fee823455ab9

  • SHA256

    af8fd5644cdd7ebbc3ed179352923760e6950c633a6a322d628191ab2e9a64aa

  • SHA512

    565ccfebf333ff6fe6dfbf0fdc086f91cab95d62242a1b9927d8ca131bba36132839094c1694be5814edceda37be2afc6c4da9b2291c37ef36d0df5e05dcca45

  • SSDEEP

    12288:WquErHF6xC9D6DmR1J98w4oknqO/CyQftQYqYbLmKj:brl6kD68JmlokQfttqY2Kj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

14 mai generateur xbox

C2

89.94.35.57:1604

Mutex

ef05e501c2e286164abf5fcaa961559f

Attributes
  • reg_key

    ef05e501c2e286164abf5fcaa961559f

  • splitter

    |'|'|

Targets

    • Target

      af8fd5644cdd7ebbc3ed179352923760e6950c633a6a322d628191ab2e9a64aa

    • Size

      425KB

    • MD5

      806051b6314f9755dec606f8d6955eb4

    • SHA1

      7e2dbf2455bcca31dfe5193f01d7fee823455ab9

    • SHA256

      af8fd5644cdd7ebbc3ed179352923760e6950c633a6a322d628191ab2e9a64aa

    • SHA512

      565ccfebf333ff6fe6dfbf0fdc086f91cab95d62242a1b9927d8ca131bba36132839094c1694be5814edceda37be2afc6c4da9b2291c37ef36d0df5e05dcca45

    • SSDEEP

      12288:WquErHF6xC9D6DmR1J98w4oknqO/CyQftQYqYbLmKj:brl6kD68JmlokQfttqY2Kj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • UPX dump on OEP (original entry point)

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Tasks