General

  • Target

    f80c8c48055c61738798952d3798fa0d995567d6c031bf933e4ae3905e399495

  • Size

    23KB

  • Sample

    221125-hh5edscd6w

  • MD5

    94cc6a62246af0257acc1aceaffd0965

  • SHA1

    c64ee8564dbfaeb67c50a362b1958806af64b30c

  • SHA256

    f80c8c48055c61738798952d3798fa0d995567d6c031bf933e4ae3905e399495

  • SHA512

    2cdf3986e40d46de099f584837a1459f89e273daf49dfa8550f5ec153f385051f6199e7f1947ffd249068cbd5a6c9d76025f42707cb316af4ab39b9aa3c552c5

  • SSDEEP

    384:B+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZh7H:Wm+71d5XRpcnuG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hguvhr-1.no-ip.biz:1988

Mutex

31fbf4a6c2e03906866a21ab3c8bcdd7

Attributes
  • reg_key

    31fbf4a6c2e03906866a21ab3c8bcdd7

  • splitter

    |'|'|

Targets

    • Target

      f80c8c48055c61738798952d3798fa0d995567d6c031bf933e4ae3905e399495

    • Size

      23KB

    • MD5

      94cc6a62246af0257acc1aceaffd0965

    • SHA1

      c64ee8564dbfaeb67c50a362b1958806af64b30c

    • SHA256

      f80c8c48055c61738798952d3798fa0d995567d6c031bf933e4ae3905e399495

    • SHA512

      2cdf3986e40d46de099f584837a1459f89e273daf49dfa8550f5ec153f385051f6199e7f1947ffd249068cbd5a6c9d76025f42707cb316af4ab39b9aa3c552c5

    • SSDEEP

      384:B+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZh7H:Wm+71d5XRpcnuG

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks