General

  • Target

    4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507

  • Size

    29KB

  • Sample

    221030-x86sgaggcq

  • MD5

    81d47137b6e65a165d195653d94b4dd0

  • SHA1

    1ef18f2a7cd19ea0ea9936ae378e848d7b675284

  • SHA256

    4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507

  • SHA512

    95b4d44715a904f340e68da95466f5ab96cb09250ff3ed46a2b891c17b4c083a922e127480d0e8ee56f219bae1fe500d03ffcb70261023452a55bad85e7511ce

  • SSDEEP

    768:/2u75oa4fu124A2FjXeJBKh0p29SgRwm:T75CPoj8KhG29jwm

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

maaher1.no-ip.biz:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507

    • Size

      29KB

    • MD5

      81d47137b6e65a165d195653d94b4dd0

    • SHA1

      1ef18f2a7cd19ea0ea9936ae378e848d7b675284

    • SHA256

      4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507

    • SHA512

      95b4d44715a904f340e68da95466f5ab96cb09250ff3ed46a2b891c17b4c083a922e127480d0e8ee56f219bae1fe500d03ffcb70261023452a55bad85e7511ce

    • SSDEEP

      768:/2u75oa4fu124A2FjXeJBKh0p29SgRwm:T75CPoj8KhG29jwm

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks