General

  • Target

    39db1b79de11173ee66c9b5eac3ee0afaea44c2c064264c33eb9e9eaf9998fa1

  • Size

    89KB

  • Sample

    221121-2982faef3x

  • MD5

    163da38a8b9e7bf63b1be4c7fa6e0b0e

  • SHA1

    1987c84460813b1c51cb335d9e0d61fbf33c6df6

  • SHA256

    39db1b79de11173ee66c9b5eac3ee0afaea44c2c064264c33eb9e9eaf9998fa1

  • SHA512

    de73fedceb2d43fbecb343f13837631904de9356db90c8a2eb5400f3e27f95c7c7a375966a8e20a4b7a05bba55a69a1f9bca2eb31fe0bdbdb3dc3c33eaa3dad9

  • SSDEEP

    1536:QN0X/AARWustQ08UreN3B8J1pCDWTtln/gakphoAJae93A1RS4cM:i0X903AJae93A1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Skype For Hack

C2

sakarsakar.no-ip.biz:5552

Mutex

2f46e1c9317b4792f60fca96d07d4d7d

Attributes
  • reg_key

    2f46e1c9317b4792f60fca96d07d4d7d

  • splitter

    |'|'|

Targets

    • Target

      39db1b79de11173ee66c9b5eac3ee0afaea44c2c064264c33eb9e9eaf9998fa1

    • Size

      89KB

    • MD5

      163da38a8b9e7bf63b1be4c7fa6e0b0e

    • SHA1

      1987c84460813b1c51cb335d9e0d61fbf33c6df6

    • SHA256

      39db1b79de11173ee66c9b5eac3ee0afaea44c2c064264c33eb9e9eaf9998fa1

    • SHA512

      de73fedceb2d43fbecb343f13837631904de9356db90c8a2eb5400f3e27f95c7c7a375966a8e20a4b7a05bba55a69a1f9bca2eb31fe0bdbdb3dc3c33eaa3dad9

    • SSDEEP

      1536:QN0X/AARWustQ08UreN3B8J1pCDWTtln/gakphoAJae93A1RS4cM:i0X903AJae93A1

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks