General

  • Target

    7905b946f92f80b312c37acf1f974368a54770a95a706e7d7656ecdf11f28809

  • Size

    219KB

  • Sample

    221125-jgd2gsbd73

  • MD5

    ca75033e2666a46472eeaaf2328badba

  • SHA1

    d33c4ad28257e62c0a90047c5fd69553859edc9d

  • SHA256

    7905b946f92f80b312c37acf1f974368a54770a95a706e7d7656ecdf11f28809

  • SHA512

    324ecbfad1abe8d72799eeba853903e0bd8733f50fe381dd3bcb05b442721704c12e6e89b23114b738a1b4daa4fef6cd83ac1aa6dd47b4de132f211bcc3f394a

  • SSDEEP

    3072:D538xVrxLIQ/j69ZAmqVFtVNhGKxZRGOFhhnbz/OWjuiQQh3DKaVeLpBjOcyEMaz:DV8xLIQ/j6TIZNhGWaOF33OWSkTa9Bo

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked

C2

kissme1988.no-ip.biz:5552

Mutex

dc57475995c921da5a2603cdc0101794

Attributes
  • reg_key

    dc57475995c921da5a2603cdc0101794

  • splitter

    |'|'|

Targets

    • Target

      7905b946f92f80b312c37acf1f974368a54770a95a706e7d7656ecdf11f28809

    • Size

      219KB

    • MD5

      ca75033e2666a46472eeaaf2328badba

    • SHA1

      d33c4ad28257e62c0a90047c5fd69553859edc9d

    • SHA256

      7905b946f92f80b312c37acf1f974368a54770a95a706e7d7656ecdf11f28809

    • SHA512

      324ecbfad1abe8d72799eeba853903e0bd8733f50fe381dd3bcb05b442721704c12e6e89b23114b738a1b4daa4fef6cd83ac1aa6dd47b4de132f211bcc3f394a

    • SSDEEP

      3072:D538xVrxLIQ/j69ZAmqVFtVNhGKxZRGOFhhnbz/OWjuiQQh3DKaVeLpBjOcyEMaz:DV8xLIQ/j6TIZNhGWaOF33OWSkTa9Bo

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks