General

  • Target

    5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a

  • Size

    31KB

  • Sample

    220520-1dqpjsdge2

  • MD5

    20d1dd5fffbe00e92ecd03ef84d4c453

  • SHA1

    78191645fbe8381a65efec83e1d96e14ef9bd8cc

  • SHA256

    5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a

  • SHA512

    1ae4ea038d26b63984e17a692f552410820c9d3fe8b1b51b89619e49269833dbe3e517299a044206c6e38692140ff933ea5eca34cf28a07c7bb0674d7084c9a7

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

q

C2

192.168.1.3:7777

Mutex

e1be8d1e486c97d8267b021626edf85d

Attributes
  • reg_key

    e1be8d1e486c97d8267b021626edf85d

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a

    • Size

      31KB

    • MD5

      20d1dd5fffbe00e92ecd03ef84d4c453

    • SHA1

      78191645fbe8381a65efec83e1d96e14ef9bd8cc

    • SHA256

      5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a

    • SHA512

      1ae4ea038d26b63984e17a692f552410820c9d3fe8b1b51b89619e49269833dbe3e517299a044206c6e38692140ff933ea5eca34cf28a07c7bb0674d7084c9a7

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks