General

  • Target

    f47bd27092b15713f070d76f15e0c3a28e9d1e4195e877d99cdda7e44a06e48b

  • Size

    23KB

  • Sample

    221003-qbzjkagfal

  • MD5

    67d870a3dcd569aeb88388879bb70650

  • SHA1

    36c21b2a91a2dd61824836602aa084a968a7c43d

  • SHA256

    f47bd27092b15713f070d76f15e0c3a28e9d1e4195e877d99cdda7e44a06e48b

  • SHA512

    e499dd0b42f5b93ac8dbeb040a97558ae2376da7cca675a76912fedd3831d48f106286981016056dd43e1171aef8774f27efa1ff81029f336d6180985a804189

  • SSDEEP

    384:j8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kP6:oXcwt3tRpcnuJj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      f47bd27092b15713f070d76f15e0c3a28e9d1e4195e877d99cdda7e44a06e48b

    • Size

      23KB

    • MD5

      67d870a3dcd569aeb88388879bb70650

    • SHA1

      36c21b2a91a2dd61824836602aa084a968a7c43d

    • SHA256

      f47bd27092b15713f070d76f15e0c3a28e9d1e4195e877d99cdda7e44a06e48b

    • SHA512

      e499dd0b42f5b93ac8dbeb040a97558ae2376da7cca675a76912fedd3831d48f106286981016056dd43e1171aef8774f27efa1ff81029f336d6180985a804189

    • SSDEEP

      384:j8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kP6:oXcwt3tRpcnuJj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks