General

  • Target

    d68b191ef68164b1e8be3831cfec4f19b5c9ced83ff43bfa448ea62b03d2c5e0

  • Size

    236KB

  • Sample

    221123-1vyrgsgc42

  • MD5

    43f8bc06a5750c096c6c1c36b6a85de0

  • SHA1

    a7a8eb7ca34459b0c876658f94d314784e55fa02

  • SHA256

    d68b191ef68164b1e8be3831cfec4f19b5c9ced83ff43bfa448ea62b03d2c5e0

  • SHA512

    63ba85bc83c692dca961f4f9b8c6ff97073f26d36e6f2756980ba6e9af3c88d23f08d64db90b0f817d5150c15a3461141917df2687524074760982e7d69000ee

  • SSDEEP

    6144:Mqj9P5gdINejBDJSbBF3+pIQ5BMB6SNcqUQQ:f5WI8jBDJGBZ+pBBSNnRQ

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

ToooooZ

C2

s7spomp.no-ip.info:1177

Mutex

cb4232dd73d3d66e099ddbd4051cf53b

Attributes
  • reg_key

    cb4232dd73d3d66e099ddbd4051cf53b

  • splitter

    |'|'|

Targets

    • Target

      d68b191ef68164b1e8be3831cfec4f19b5c9ced83ff43bfa448ea62b03d2c5e0

    • Size

      236KB

    • MD5

      43f8bc06a5750c096c6c1c36b6a85de0

    • SHA1

      a7a8eb7ca34459b0c876658f94d314784e55fa02

    • SHA256

      d68b191ef68164b1e8be3831cfec4f19b5c9ced83ff43bfa448ea62b03d2c5e0

    • SHA512

      63ba85bc83c692dca961f4f9b8c6ff97073f26d36e6f2756980ba6e9af3c88d23f08d64db90b0f817d5150c15a3461141917df2687524074760982e7d69000ee

    • SSDEEP

      6144:Mqj9P5gdINejBDJSbBF3+pIQ5BMB6SNcqUQQ:f5WI8jBDJGBZ+pBBSNnRQ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks