General

  • Target

    6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc

  • Size

    220KB

  • Sample

    221125-jjvf9abf49

  • MD5

    df25c6e036086ae50b311bc32fd64691

  • SHA1

    ac7611fee3fa865e8b6776e513b343992956767e

  • SHA256

    6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc

  • SHA512

    51ed24ede16b072cda33e764c6e109c85234af6957cde82bf58d44d41021d01b26b4e69d44e5110513f3f38398b710980dad4a0b4b5ebffcc4f39d59ceaaa281

  • SSDEEP

    3072:tcwb029dgZ/pRj7QbAbPF5EuOU8EStx/y9dwF0rYMbZUU1pupjyQwUr6Bx4hR4d:Hn6pR/kKPrEuSb/y9d1sRpjyQX1hR2

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

alpha-7.no-ip.biz:5552

Mutex

f3b4549e9273b6cf9b3f02a2ce32bfa0

Attributes
  • reg_key

    f3b4549e9273b6cf9b3f02a2ce32bfa0

  • splitter

    |'|'|

Targets

    • Target

      6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc

    • Size

      220KB

    • MD5

      df25c6e036086ae50b311bc32fd64691

    • SHA1

      ac7611fee3fa865e8b6776e513b343992956767e

    • SHA256

      6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc

    • SHA512

      51ed24ede16b072cda33e764c6e109c85234af6957cde82bf58d44d41021d01b26b4e69d44e5110513f3f38398b710980dad4a0b4b5ebffcc4f39d59ceaaa281

    • SSDEEP

      3072:tcwb029dgZ/pRj7QbAbPF5EuOU8EStx/y9dwF0rYMbZUU1pupjyQwUr6Bx4hR4d:Hn6pR/kKPrEuSb/y9d1sRpjyQX1hR2

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks