General

  • Target

    https://bazaar.abuse.ch/

  • Sample

    240911-cz7m7ayhjc

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Victim

C2

hakim32.ddns.net:2000

0.tcp.eu.ngrok.io:11348

Mutex

06b22b2a8c6c511de75528741425ba83

Attributes
  • reg_key

    06b22b2a8c6c511de75528741425ba83

  • splitter

    |'|'|

Targets

    • Target

      https://bazaar.abuse.ch/

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks