General

  • Target

    01a0401a637d3d2da29c6af78f778a510fe85becd2f8ddc06a02f6a9715ccbe5

  • Size

    23KB

  • Sample

    221002-rq1wlscaem

  • MD5

    6f68a34f95151d1e6f7de4f416df7700

  • SHA1

    27ab90081c591d7e18f3e3a7c65200255ff3be3f

  • SHA256

    01a0401a637d3d2da29c6af78f778a510fe85becd2f8ddc06a02f6a9715ccbe5

  • SHA512

    4437b9fd0b47d103b984d0826f02baae58d1f66f4614f6a73ed72ef4538d085c2d5525989326540c213786d6cadb552f74cb12d5a85a78fdf903b5fa8beb91e1

  • SSDEEP

    384:doWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZO3:C7O89p2rRpcnuH

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

SALIM

C2

baccar.zapto.org:5552

Mutex

53c23e6948aa7d700ac5f23c34b67c35

Attributes
  • reg_key

    53c23e6948aa7d700ac5f23c34b67c35

  • splitter

    |'|'|

Targets

    • Target

      01a0401a637d3d2da29c6af78f778a510fe85becd2f8ddc06a02f6a9715ccbe5

    • Size

      23KB

    • MD5

      6f68a34f95151d1e6f7de4f416df7700

    • SHA1

      27ab90081c591d7e18f3e3a7c65200255ff3be3f

    • SHA256

      01a0401a637d3d2da29c6af78f778a510fe85becd2f8ddc06a02f6a9715ccbe5

    • SHA512

      4437b9fd0b47d103b984d0826f02baae58d1f66f4614f6a73ed72ef4538d085c2d5525989326540c213786d6cadb552f74cb12d5a85a78fdf903b5fa8beb91e1

    • SSDEEP

      384:doWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZO3:C7O89p2rRpcnuH

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks