General

  • Target

    eefb36ca9be3ce5a0cb9489a83eb19c45ebba486c8ec005e72137af8eae5876a

  • Size

    200KB

  • Sample

    220521-aaej1ahhd3

  • MD5

    6d7ef8b992dae67b4530170cc413e357

  • SHA1

    ea0c46b6ce6a5bb0f7676664282cab78e66864c1

  • SHA256

    eefb36ca9be3ce5a0cb9489a83eb19c45ebba486c8ec005e72137af8eae5876a

  • SHA512

    f485dcfe06829cc77b65aec42e86e55f454f06d2da344cf0d56e032a1cee4dccbc856b68d5b864eca5ab362b16e2781b53c8b8a4d0feda77efdb3214215f8161

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

selluehaikon.ddns.net:1177

Mutex

ea8132665c78a53dee0dbbdf6c1b3aa4

Attributes
  • reg_key

    ea8132665c78a53dee0dbbdf6c1b3aa4

  • splitter

    |'|'|

Targets

    • Target

      eefb36ca9be3ce5a0cb9489a83eb19c45ebba486c8ec005e72137af8eae5876a

    • Size

      200KB

    • MD5

      6d7ef8b992dae67b4530170cc413e357

    • SHA1

      ea0c46b6ce6a5bb0f7676664282cab78e66864c1

    • SHA256

      eefb36ca9be3ce5a0cb9489a83eb19c45ebba486c8ec005e72137af8eae5876a

    • SHA512

      f485dcfe06829cc77b65aec42e86e55f454f06d2da344cf0d56e032a1cee4dccbc856b68d5b864eca5ab362b16e2781b53c8b8a4d0feda77efdb3214215f8161

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks