General

  • Target

    eeb241cbaeb8035f147c2d776531ce81e8c3037824a8cc7b338ac01c261748b2

  • Size

    1.4MB

  • Sample

    221123-l2q8nagc2y

  • MD5

    db0833bbdf05366179475429fb48346a

  • SHA1

    c40dd88898948630b8ab8c78b1c68afdcf776554

  • SHA256

    eeb241cbaeb8035f147c2d776531ce81e8c3037824a8cc7b338ac01c261748b2

  • SHA512

    92f726c3b4362287376554b13494d7a94371f7409ce315a38947e21a119392b716b37895c752550877f5dacb242ecd4e6d21be9acca9a637a68af1a590e450e2

  • SSDEEP

    24576:JFLjt/NTbdbzs7+3N5zXN2oRfpZFL/5wXKCyFOBsrvwqSvytsw/KaYUm97MaAgN3:DarTKM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked

C2

78.58.25.3:1604

Mutex

3c81f15329f5d2e1b97665d2e5393ea1

Attributes
  • reg_key

    3c81f15329f5d2e1b97665d2e5393ea1

  • splitter

    |'|'|

Targets

    • Target

      eeb241cbaeb8035f147c2d776531ce81e8c3037824a8cc7b338ac01c261748b2

    • Size

      1.4MB

    • MD5

      db0833bbdf05366179475429fb48346a

    • SHA1

      c40dd88898948630b8ab8c78b1c68afdcf776554

    • SHA256

      eeb241cbaeb8035f147c2d776531ce81e8c3037824a8cc7b338ac01c261748b2

    • SHA512

      92f726c3b4362287376554b13494d7a94371f7409ce315a38947e21a119392b716b37895c752550877f5dacb242ecd4e6d21be9acca9a637a68af1a590e450e2

    • SSDEEP

      24576:JFLjt/NTbdbzs7+3N5zXN2oRfpZFL/5wXKCyFOBsrvwqSvytsw/KaYUm97MaAgN3:DarTKM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks