General

  • Target

    926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642

  • Size

    33KB

  • Sample

    221003-cxejmacca7

  • MD5

    538a95adc47384e2b9cc837488628de8

  • SHA1

    d0ead0592e2f891d1304be71ccd755c78e94adfa

  • SHA256

    926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642

  • SHA512

    947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627

  • SSDEEP

    384:CDKimCftl7ndJoc8e9v55Do7mmmqDspHe4qGBsbh0w4wlAokw9OhgOL1vYRGOZz9:oKAD7zoc86xi74q8HeoBKh0p29SgRoo

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Boy Hacker Kurdish

C2

boyhacker.no-ip.org:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642

    • Size

      33KB

    • MD5

      538a95adc47384e2b9cc837488628de8

    • SHA1

      d0ead0592e2f891d1304be71ccd755c78e94adfa

    • SHA256

      926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642

    • SHA512

      947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627

    • SSDEEP

      384:CDKimCftl7ndJoc8e9v55Do7mmmqDspHe4qGBsbh0w4wlAokw9OhgOL1vYRGOZz9:oKAD7zoc86xi74q8HeoBKh0p29SgRoo

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks