General

  • Target

    52dc70b727d09c71f68f457546a48f01d78c6b9cd13c04d7c9594c01325ffe3c

  • Size

    23KB

  • Sample

    220717-b3dzlsbfhk

  • MD5

    62562e69384b78f1be287950a8354778

  • SHA1

    a67f12063d415ed305aacb50237beb6407ef75d1

  • SHA256

    52dc70b727d09c71f68f457546a48f01d78c6b9cd13c04d7c9594c01325ffe3c

  • SHA512

    8c59bfc761c726f6232e751d5013f48a3ab9fc8f5924bfba3ce8bb0e1b9dfa43d12859dff3f2b114f91e8daf0a9f37daf1cddc5b6b8710cec3c59bce88c5e4fc

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      52dc70b727d09c71f68f457546a48f01d78c6b9cd13c04d7c9594c01325ffe3c

    • Size

      23KB

    • MD5

      62562e69384b78f1be287950a8354778

    • SHA1

      a67f12063d415ed305aacb50237beb6407ef75d1

    • SHA256

      52dc70b727d09c71f68f457546a48f01d78c6b9cd13c04d7c9594c01325ffe3c

    • SHA512

      8c59bfc761c726f6232e751d5013f48a3ab9fc8f5924bfba3ce8bb0e1b9dfa43d12859dff3f2b114f91e8daf0a9f37daf1cddc5b6b8710cec3c59bce88c5e4fc

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks