General

  • Target

    ec97891dc8ec0b95e004b1397a7360b7bdde2699a9369409bc10e2939b9df56d

  • Size

    23KB

  • Sample

    221125-2656dagg7x

  • MD5

    5ff84d0c70279992ca362d19526ad195

  • SHA1

    3ab0eaaa73d68e15e3f1ca97050f117a27f9bcbc

  • SHA256

    ec97891dc8ec0b95e004b1397a7360b7bdde2699a9369409bc10e2939b9df56d

  • SHA512

    81a216074323c6c5453f72a2c2a3dc9cfa514261d2ba881b4dfdd10b1c529e8f7e339f139dfe7c2ddfd5380a5392ecf3497bb2136dd22e5523322e91921b338c

  • SSDEEP

    384:F8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kB:WXcwt3tRpcnuJg

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      ec97891dc8ec0b95e004b1397a7360b7bdde2699a9369409bc10e2939b9df56d

    • Size

      23KB

    • MD5

      5ff84d0c70279992ca362d19526ad195

    • SHA1

      3ab0eaaa73d68e15e3f1ca97050f117a27f9bcbc

    • SHA256

      ec97891dc8ec0b95e004b1397a7360b7bdde2699a9369409bc10e2939b9df56d

    • SHA512

      81a216074323c6c5453f72a2c2a3dc9cfa514261d2ba881b4dfdd10b1c529e8f7e339f139dfe7c2ddfd5380a5392ecf3497bb2136dd22e5523322e91921b338c

    • SSDEEP

      384:F8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kB:WXcwt3tRpcnuJg

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks