General

  • Target

    5160cc503a2c3702bc33af071046a4896ef3bbd95ba7681691bb9ff9769144a1

  • Size

    72KB

  • Sample

    221124-ag2m4shf71

  • MD5

    c3bd5110ac2bfbf0e7cf2b740648ea0b

  • SHA1

    bf3b8b7e2cc3f17ec2c67559a3025f0357f02ad9

  • SHA256

    5160cc503a2c3702bc33af071046a4896ef3bbd95ba7681691bb9ff9769144a1

  • SHA512

    f471d956a01afdb23938a1de498b8233aa485492b9cc968ceda410af2db97ff1e48b81203d82698097edce6095f3ba544f7ed23238a90f0350ea7cf1fb2913e7

  • SSDEEP

    1536:IUoHxHeme0hyXcg+lRD2ibuDqkSZZZ3dP:IXFeme4OFMRDTbwU9

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Ultoz NO_IP NEW

C2

anti96.myq-see.com:81

Mutex

93f19dda2412c86ad7520ba4198f39a0

Attributes
  • reg_key

    93f19dda2412c86ad7520ba4198f39a0

  • splitter

    |'|'|

Targets

    • Target

      5160cc503a2c3702bc33af071046a4896ef3bbd95ba7681691bb9ff9769144a1

    • Size

      72KB

    • MD5

      c3bd5110ac2bfbf0e7cf2b740648ea0b

    • SHA1

      bf3b8b7e2cc3f17ec2c67559a3025f0357f02ad9

    • SHA256

      5160cc503a2c3702bc33af071046a4896ef3bbd95ba7681691bb9ff9769144a1

    • SHA512

      f471d956a01afdb23938a1de498b8233aa485492b9cc968ceda410af2db97ff1e48b81203d82698097edce6095f3ba544f7ed23238a90f0350ea7cf1fb2913e7

    • SSDEEP

      1536:IUoHxHeme0hyXcg+lRD2ibuDqkSZZZ3dP:IXFeme4OFMRDTbwU9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks