General

  • Target

    dd1262ce6d8488aaea364ef7a3d2938e116c4bfce85deb6aa7fb433960a830a3

  • Size

    29KB

  • Sample

    221124-wv4waaed7y

  • MD5

    44f646bc5aba91948267b5234704b4d7

  • SHA1

    2ea965e5b8ff2ffe13353fd8df86cd12eef441dd

  • SHA256

    dd1262ce6d8488aaea364ef7a3d2938e116c4bfce85deb6aa7fb433960a830a3

  • SHA512

    722a79b5d07f78bbe5231570159cd3f93eb850d2d172e8226dcffdba7f6fb1381a176b2822971954f63dd980767d5281e96f1e36e4d2b81a4e392bf6323a546e

  • SSDEEP

    768:Qj77ucYfKQTtzjAqc3eUBKh0p29SgRvY:M7hWVUJZKhG29jvY

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

tagmoute123.no-ip.biz:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      dd1262ce6d8488aaea364ef7a3d2938e116c4bfce85deb6aa7fb433960a830a3

    • Size

      29KB

    • MD5

      44f646bc5aba91948267b5234704b4d7

    • SHA1

      2ea965e5b8ff2ffe13353fd8df86cd12eef441dd

    • SHA256

      dd1262ce6d8488aaea364ef7a3d2938e116c4bfce85deb6aa7fb433960a830a3

    • SHA512

      722a79b5d07f78bbe5231570159cd3f93eb850d2d172e8226dcffdba7f6fb1381a176b2822971954f63dd980767d5281e96f1e36e4d2b81a4e392bf6323a546e

    • SSDEEP

      768:Qj77ucYfKQTtzjAqc3eUBKh0p29SgRvY:M7hWVUJZKhG29jvY

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks