General

  • Target

    a71ba879d166447ef15b4f47b4ada37d.exe

  • Size

    289KB

  • Sample

    211125-dzrgmshea7

  • MD5

    a71ba879d166447ef15b4f47b4ada37d

  • SHA1

    57e1875c7b1e6ceadabb76738e9d07b8eb9961cd

  • SHA256

    b05d5f2ac5b095957a0a29d3c6d4ae6794194071a6b62188dd370467d844f9a9

  • SHA512

    47e47af6ad25392f8cf2e066fb022aba2af2059ef2b0540209d24d5c43210b4344cb855734842f9df92004c91c51b6d3a82dbdc12cdbe697d1210c9deebf981f

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

davizshadow.duckdns.org:14996

Mutex

9c4132e4eb289a044118991f2f92c8c6

Attributes
  • reg_key

    9c4132e4eb289a044118991f2f92c8c6

  • splitter

    |'|'|

Targets

    • Target

      a71ba879d166447ef15b4f47b4ada37d.exe

    • Size

      289KB

    • MD5

      a71ba879d166447ef15b4f47b4ada37d

    • SHA1

      57e1875c7b1e6ceadabb76738e9d07b8eb9961cd

    • SHA256

      b05d5f2ac5b095957a0a29d3c6d4ae6794194071a6b62188dd370467d844f9a9

    • SHA512

      47e47af6ad25392f8cf2e066fb022aba2af2059ef2b0540209d24d5c43210b4344cb855734842f9df92004c91c51b6d3a82dbdc12cdbe697d1210c9deebf981f

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks