General

  • Target

    906D7922A3F3A0CC91BBD911996C92F2.exe

  • Size

    296KB

  • Sample

    210816-eyx93p873x

  • MD5

    906d7922a3f3a0cc91bbd911996c92f2

  • SHA1

    17039ace019e1b1e403bd94a3d628abdb79d6d15

  • SHA256

    99f2ebec7674cee93ee71093bac9a16773a49a185939ea5923ae1f8f3250a9d9

  • SHA512

    d6424bd66b4223419c70bd0e70a8615e2a2fb26f798fa93e9a7aa9f9610f0382ac6fa22238375d722c93d4dbc712db7b3789a7fd773987a1e77d73f7bd0ceb53

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

doza122.con-ip.com:5552

Mutex

68a4a42151e9c45f922a140954d9441d

Attributes
  • reg_key

    68a4a42151e9c45f922a140954d9441d

  • splitter

    |'|'|

Targets

    • Target

      906D7922A3F3A0CC91BBD911996C92F2.exe

    • Size

      296KB

    • MD5

      906d7922a3f3a0cc91bbd911996c92f2

    • SHA1

      17039ace019e1b1e403bd94a3d628abdb79d6d15

    • SHA256

      99f2ebec7674cee93ee71093bac9a16773a49a185939ea5923ae1f8f3250a9d9

    • SHA512

      d6424bd66b4223419c70bd0e70a8615e2a2fb26f798fa93e9a7aa9f9610f0382ac6fa22238375d722c93d4dbc712db7b3789a7fd773987a1e77d73f7bd0ceb53

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks