General

  • Target

    bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c

  • Size

    135KB

  • Sample

    221004-bs4saafeb7

  • MD5

    5545ae28ff0bebf154aef083b82850b0

  • SHA1

    475f7df3a0fd6c97fa5b3f7847e67e259f144cb5

  • SHA256

    bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c

  • SHA512

    a6b1ba07a7a1786625dee19d412ed27e6ba4380f89c00681e662b4162f56d46527189f8a0d4e9962875360998be1e29fb654397e2534f60b777466d585ee451f

  • SSDEEP

    3072:2nj9jtfU+INndIc0J45iTgmygDgRrmIWdoQGq00D:2jbeiVVDgRI3GqN

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

turkmurat.no-ip.org:1604

Mutex

632188ae0b130ac89e674b99bc07ac55

Attributes
  • reg_key

    632188ae0b130ac89e674b99bc07ac55

  • splitter

    |'|'|

Targets

    • Target

      bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c

    • Size

      135KB

    • MD5

      5545ae28ff0bebf154aef083b82850b0

    • SHA1

      475f7df3a0fd6c97fa5b3f7847e67e259f144cb5

    • SHA256

      bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c

    • SHA512

      a6b1ba07a7a1786625dee19d412ed27e6ba4380f89c00681e662b4162f56d46527189f8a0d4e9962875360998be1e29fb654397e2534f60b777466d585ee451f

    • SSDEEP

      3072:2nj9jtfU+INndIc0J45iTgmygDgRrmIWdoQGq00D:2jbeiVVDgRI3GqN

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks