General

  • Target

    f9594e56757e9ea47d5bf9c197f998c62b81210c5e0d09f48b5c338dd9760285

  • Size

    176KB

  • Sample

    221123-pvxzeacc84

  • MD5

    723bff1cecdb25f0e189903c3da43e37

  • SHA1

    c29c78cb18f1241adc4f5d0586dcd8084fee7bf4

  • SHA256

    f9594e56757e9ea47d5bf9c197f998c62b81210c5e0d09f48b5c338dd9760285

  • SHA512

    7ebd55242947558e39153414620ee92f7e1d6b31331fdb03203e697c1b55c3a5cbbf9c41f837c9fba9b66585b0f8ddddf962fe43712c97d7c8487d9abca4c91f

  • SSDEEP

    3072:2+RL0PoFS5rWGXBbxQx7fV0Gwtu2Bs7RfCAz2ZCnZSftPHuan/n7N/nAh/Q1Y/:HODXxyx504qcxCAyCMxOcn7N/Xe

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

justme10.no-ip.org:1177

Mutex

ed755b81076a7d6243f11a2d30431944

Attributes
  • reg_key

    ed755b81076a7d6243f11a2d30431944

  • splitter

    |'|'|

Targets

    • Target

      f9594e56757e9ea47d5bf9c197f998c62b81210c5e0d09f48b5c338dd9760285

    • Size

      176KB

    • MD5

      723bff1cecdb25f0e189903c3da43e37

    • SHA1

      c29c78cb18f1241adc4f5d0586dcd8084fee7bf4

    • SHA256

      f9594e56757e9ea47d5bf9c197f998c62b81210c5e0d09f48b5c338dd9760285

    • SHA512

      7ebd55242947558e39153414620ee92f7e1d6b31331fdb03203e697c1b55c3a5cbbf9c41f837c9fba9b66585b0f8ddddf962fe43712c97d7c8487d9abca4c91f

    • SSDEEP

      3072:2+RL0PoFS5rWGXBbxQx7fV0Gwtu2Bs7RfCAz2ZCnZSftPHuan/n7N/nAh/Q1Y/:HODXxyx504qcxCAyCMxOcn7N/Xe

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks