General

  • Target

    97d72efbb1f6fea3f158b136c330689d

  • Size

    67KB

  • Sample

    240502-ela36sgc7y

  • MD5

    97d72efbb1f6fea3f158b136c330689d

  • SHA1

    43c884250ed032ced44d72d932518e831a34161d

  • SHA256

    2ff91319fbcc02e9dd7d80e21f5f7f48e0ae24b99a1b26625d344ab4812f37c4

  • SHA512

    a9937e30d19ebf33ebe4c20792f7499e79996f06b5e3bc6f28d506ba4440640ebc923d424184007f2f111c3706876c029f6d4e41d5ed144c2b8e666b32689596

  • SSDEEP

    1536:uuKlhoxbyGiiKkTvTiCUU8b+a1fJ3l4fLU2cjdFZPvf9G95T8KCc4:NKOyGxKIiCV8aa1fJV4zMF54ra

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

0.tcp.eu.ngrok.io:18350

Mutex

f2d4732908d59805d830a49d36974ac0

Attributes
  • reg_key

    f2d4732908d59805d830a49d36974ac0

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      97d72efbb1f6fea3f158b136c330689d

    • Size

      67KB

    • MD5

      97d72efbb1f6fea3f158b136c330689d

    • SHA1

      43c884250ed032ced44d72d932518e831a34161d

    • SHA256

      2ff91319fbcc02e9dd7d80e21f5f7f48e0ae24b99a1b26625d344ab4812f37c4

    • SHA512

      a9937e30d19ebf33ebe4c20792f7499e79996f06b5e3bc6f28d506ba4440640ebc923d424184007f2f111c3706876c029f6d4e41d5ed144c2b8e666b32689596

    • SSDEEP

      1536:uuKlhoxbyGiiKkTvTiCUU8b+a1fJ3l4fLU2cjdFZPvf9G95T8KCc4:NKOyGxKIiCV8aa1fJV4zMF54ra

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Stops running service(s)

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Impair Defenses

1
T1562

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks