General

  • Target

    84a8df3bd6f3d5374160937906bbbacb0bb0fd8b33fb95b1bad0de08cd06f286

  • Size

    27KB

  • Sample

    221124-2vvkhaeb67

  • MD5

    014f92ef9fac6279662138f915980ad5

  • SHA1

    cf25da0943661adf38b715e3467fda54904f58d5

  • SHA256

    84a8df3bd6f3d5374160937906bbbacb0bb0fd8b33fb95b1bad0de08cd06f286

  • SHA512

    4877a104e7ef866a600f1270679ec4f96c90927d9e08f8c2c4ebff397e77798e7457b54f2e387d039ad0194edb5ef71514afd46449ef9e7c3ad9f28cfc73d632

  • SSDEEP

    384:A+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZGb3vM3fBy:vm+71d5XRpcnub3E3pVgDT

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

nawrasoon.ddns.net:1920

Mutex

f0c5bb765041585c51e5b576594f5166

Attributes
  • reg_key

    f0c5bb765041585c51e5b576594f5166

  • splitter

    |'|'|

Targets

    • Target

      84a8df3bd6f3d5374160937906bbbacb0bb0fd8b33fb95b1bad0de08cd06f286

    • Size

      27KB

    • MD5

      014f92ef9fac6279662138f915980ad5

    • SHA1

      cf25da0943661adf38b715e3467fda54904f58d5

    • SHA256

      84a8df3bd6f3d5374160937906bbbacb0bb0fd8b33fb95b1bad0de08cd06f286

    • SHA512

      4877a104e7ef866a600f1270679ec4f96c90927d9e08f8c2c4ebff397e77798e7457b54f2e387d039ad0194edb5ef71514afd46449ef9e7c3ad9f28cfc73d632

    • SSDEEP

      384:A+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZGb3vM3fBy:vm+71d5XRpcnub3E3pVgDT

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks