General

  • Target

    1465a73a0fad4bd15933545c9867fd3983264789f77518838d4a361953ed3d9e

  • Size

    204KB

  • Sample

    221125-j7hscsdc82

  • MD5

    a61361872990e3673eb61b624a94b628

  • SHA1

    4512f5624540c96899f10bd0463fd2ae537e6224

  • SHA256

    1465a73a0fad4bd15933545c9867fd3983264789f77518838d4a361953ed3d9e

  • SHA512

    17a9afee76896c38b227c4bf22d1a2470788785b34d83a41dc25986d6429eda140ca67d4c6d7d80c6821f722e13283f5a1936867e2233848cf42ed187bf67c59

  • SSDEEP

    3072:FweUySPS680+C4WodY4rrw00dpJaa4ql5toHqzJe/dAfdg0:FlUoWoijdfjo

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

‏فہۧايہۧروسہ الہۧعہۧراق هناا

C2

jaki3254.ddns.net:2001

Mutex

85039fd7c6f37e1e0601b12298c6e30f

Attributes
  • reg_key

    85039fd7c6f37e1e0601b12298c6e30f

  • splitter

    |'|'|

Targets

    • Target

      1465a73a0fad4bd15933545c9867fd3983264789f77518838d4a361953ed3d9e

    • Size

      204KB

    • MD5

      a61361872990e3673eb61b624a94b628

    • SHA1

      4512f5624540c96899f10bd0463fd2ae537e6224

    • SHA256

      1465a73a0fad4bd15933545c9867fd3983264789f77518838d4a361953ed3d9e

    • SHA512

      17a9afee76896c38b227c4bf22d1a2470788785b34d83a41dc25986d6429eda140ca67d4c6d7d80c6821f722e13283f5a1936867e2233848cf42ed187bf67c59

    • SSDEEP

      3072:FweUySPS680+C4WodY4rrw00dpJaa4ql5toHqzJe/dAfdg0:FlUoWoijdfjo

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks