General

  • Target

    tmp/8e0a2564-642d-46ab-b77d-8467f0db75ce_S.exe

  • Size

    23KB

  • Sample

    211223-1wn9fabfe8

  • MD5

    721379f79a9bf4f463d7e0998698fbd5

  • SHA1

    18ab864d6790086218b1350df091ad5e84bb1a4c

  • SHA256

    fa28ad86ab796c8e18096badc31bcb1719474d268945172d983bb30ded219944

  • SHA512

    255c690908d8369dfc0f89ac958a07e098405344854e242c061a4b1a1a45c6f61e015eb6d6f162bd1786582de191e769334e1627b2234a88cd1f861de26b2b4a

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

prueba

C2

111.90.149.115:9443

Mutex

f2defcfce1660e18fd445b5dbce27282

Attributes
  • reg_key

    f2defcfce1660e18fd445b5dbce27282

  • splitter

    |'|'|

Targets

    • Target

      tmp/8e0a2564-642d-46ab-b77d-8467f0db75ce_S.exe

    • Size

      23KB

    • MD5

      721379f79a9bf4f463d7e0998698fbd5

    • SHA1

      18ab864d6790086218b1350df091ad5e84bb1a4c

    • SHA256

      fa28ad86ab796c8e18096badc31bcb1719474d268945172d983bb30ded219944

    • SHA512

      255c690908d8369dfc0f89ac958a07e098405344854e242c061a4b1a1a45c6f61e015eb6d6f162bd1786582de191e769334e1627b2234a88cd1f861de26b2b4a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks