General

  • Target

    53caf7631ce89d012f65671379f89256d7b2e3b4671c54edc5c0e1c5d360783f

  • Size

    63KB

  • Sample

    221003-cxcp2acca5

  • MD5

    3592c0c1bb5bca3a4ffa1bcc913b6c4e

  • SHA1

    6bd255b3f1452e70db99d29b9768445128ac404e

  • SHA256

    53caf7631ce89d012f65671379f89256d7b2e3b4671c54edc5c0e1c5d360783f

  • SHA512

    fc61763d0b7a030120dbf0bd00b51c3c5f2a0cdf7c942e70bd35e88c076f8a73ae163a5cb3e1dd97ca34879dae2d0a57315969e68564ced6a065089d97b42db9

  • SSDEEP

    768:k74oqIjlLTAqM3eFBKh0p29SgR7N8R8uvRTEJc5v584yyckhRqf4TXRWaBVj:k74S0psKhG29jR86uZ6Qv58khRqfk3

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

barbaros-dz.no-ip.biz:1177

Mutex

789f1998db6621cff9ef40c79b88a33c

Attributes
  • reg_key

    789f1998db6621cff9ef40c79b88a33c

  • splitter

    |'|'|

Targets

    • Target

      53caf7631ce89d012f65671379f89256d7b2e3b4671c54edc5c0e1c5d360783f

    • Size

      63KB

    • MD5

      3592c0c1bb5bca3a4ffa1bcc913b6c4e

    • SHA1

      6bd255b3f1452e70db99d29b9768445128ac404e

    • SHA256

      53caf7631ce89d012f65671379f89256d7b2e3b4671c54edc5c0e1c5d360783f

    • SHA512

      fc61763d0b7a030120dbf0bd00b51c3c5f2a0cdf7c942e70bd35e88c076f8a73ae163a5cb3e1dd97ca34879dae2d0a57315969e68564ced6a065089d97b42db9

    • SSDEEP

      768:k74oqIjlLTAqM3eFBKh0p29SgR7N8R8uvRTEJc5v584yyckhRqf4TXRWaBVj:k74S0psKhG29jR86uZ6Qv58khRqfk3

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks