General

  • Target

    3fff18d8707309dce7e0f06beb03e3c1d4d48eb8fcdf8bbfec3495caa64016b4

  • Size

    220KB

  • Sample

    221123-yvp38seb6x

  • MD5

    0712b729fb6514e42519d092fa55f13c

  • SHA1

    37c595fc0e5535130896183e71c6aa37da22dba7

  • SHA256

    3fff18d8707309dce7e0f06beb03e3c1d4d48eb8fcdf8bbfec3495caa64016b4

  • SHA512

    a6f217b8aa38d0740cc49b3445608a3c1ab4deef6791fcb4fabd4cbe5983ba7c321aa85566641e214e37baa9bd48d5b4728118a086f86246d37dd2304976f2f7

  • SSDEEP

    3072:WyCMEWB8gIeHQ0GCyHcJiH0eu9NanNHyqpQdSg08s9V3t6IatWgABDBOwNDGECmm:kwBpIeHFM0euHKd7/t69ABdN2

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

malekbb.no-ip.biz:5552

Mutex

2e677746db2b1452e10a29128e99fedc

Attributes
  • reg_key

    2e677746db2b1452e10a29128e99fedc

  • splitter

    |'|'|

Targets

    • Target

      3fff18d8707309dce7e0f06beb03e3c1d4d48eb8fcdf8bbfec3495caa64016b4

    • Size

      220KB

    • MD5

      0712b729fb6514e42519d092fa55f13c

    • SHA1

      37c595fc0e5535130896183e71c6aa37da22dba7

    • SHA256

      3fff18d8707309dce7e0f06beb03e3c1d4d48eb8fcdf8bbfec3495caa64016b4

    • SHA512

      a6f217b8aa38d0740cc49b3445608a3c1ab4deef6791fcb4fabd4cbe5983ba7c321aa85566641e214e37baa9bd48d5b4728118a086f86246d37dd2304976f2f7

    • SSDEEP

      3072:WyCMEWB8gIeHQ0GCyHcJiH0eu9NanNHyqpQdSg08s9V3t6IatWgABDBOwNDGECmm:kwBpIeHFM0euHKd7/t69ABdN2

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks