General

  • Target

    a030539de58c3d9e18f770feb17270399b6641f5cbcb14a78db10c4055a8ce8d

  • Size

    244KB

  • Sample

    221004-b1n2ssfgf9

  • MD5

    36539f9812df8ba44239578a6b1337f0

  • SHA1

    9fc68b455c20524ec84de1dc229d679c35fb815b

  • SHA256

    a030539de58c3d9e18f770feb17270399b6641f5cbcb14a78db10c4055a8ce8d

  • SHA512

    54e1b41f049d9fc82c18e5ec02918a43d3958d94cf0f32950f3545d10b6dde0a10e10605bf1c1c9bf73f7f320f108bf93821b5d11c285bd2ecfa247b3db493d7

  • SSDEEP

    6144:0txyKPuUW/1FT6AGG+adsw7OtQSGUh+Yc8XRGzVL:xKGT/1FTt399ShhGGqV

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

mohamedtota.no-ip.biz:5552

Mutex

687fa46eb30322ccea811da1aed2fce9

Attributes
  • reg_key

    687fa46eb30322ccea811da1aed2fce9

  • splitter

    |'|'|

Targets

    • Target

      a030539de58c3d9e18f770feb17270399b6641f5cbcb14a78db10c4055a8ce8d

    • Size

      244KB

    • MD5

      36539f9812df8ba44239578a6b1337f0

    • SHA1

      9fc68b455c20524ec84de1dc229d679c35fb815b

    • SHA256

      a030539de58c3d9e18f770feb17270399b6641f5cbcb14a78db10c4055a8ce8d

    • SHA512

      54e1b41f049d9fc82c18e5ec02918a43d3958d94cf0f32950f3545d10b6dde0a10e10605bf1c1c9bf73f7f320f108bf93821b5d11c285bd2ecfa247b3db493d7

    • SSDEEP

      6144:0txyKPuUW/1FT6AGG+adsw7OtQSGUh+Yc8XRGzVL:xKGT/1FTt399ShhGGqV

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks