General

  • Target

    d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba

  • Size

    29KB

  • Sample

    221125-zr8xlshe3x

  • MD5

    f1bc51554d061e253ee70be76d5257c7

  • SHA1

    f21ed970c458f71476566b64acfa9939d8bad6f4

  • SHA256

    d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba

  • SHA512

    67d2542f34fb81d2eaa490d625542f8ed3aa74e5f2acbf0a1fddf4e8d6a0734fb9f3f1f78f7a87ef456d47125db9113b1e839b7e02788edf92da7ba899c83074

  • SSDEEP

    384:bhQXpl7dzns8oDw/LRP55/4GWmqDSeXegLGBsbh0w4wlAokw9OhgOL1vYRGOZzZ1:bE7Js8oDSJz4wqZXenBKh0p29SgRec

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

lovesafa.no-ip.biz:1177

Mutex

e79d569ba77562f0d4316e586835f0a2

Attributes
  • reg_key

    e79d569ba77562f0d4316e586835f0a2

  • splitter

    |'|'|

Targets

    • Target

      d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba

    • Size

      29KB

    • MD5

      f1bc51554d061e253ee70be76d5257c7

    • SHA1

      f21ed970c458f71476566b64acfa9939d8bad6f4

    • SHA256

      d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba

    • SHA512

      67d2542f34fb81d2eaa490d625542f8ed3aa74e5f2acbf0a1fddf4e8d6a0734fb9f3f1f78f7a87ef456d47125db9113b1e839b7e02788edf92da7ba899c83074

    • SSDEEP

      384:bhQXpl7dzns8oDw/LRP55/4GWmqDSeXegLGBsbh0w4wlAokw9OhgOL1vYRGOZzZ1:bE7Js8oDSJz4wqZXenBKh0p29SgRec

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks