General

  • Target

    1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42

  • Size

    440KB

  • Sample

    221126-2byg2sdc6w

  • MD5

    c4685f33c8dbb6aa3fbdcb4f1d7d4aac

  • SHA1

    f6a75a55beedf019fdc23c65cefce1b3e829bc9a

  • SHA256

    1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42

  • SHA512

    78bd77b5c9646406fb3a12ee0ad93bb44a5c8dd7d5c07415d7a22528c68b55e7c70b6b7dac6f92370fe715f03ec61529e55e9278c2ffc2a7f13eb5512afaa056

  • SSDEEP

    12288:RtztJcg9EmcjJowktoOAbE928urH+DjBAjnL/:nztJ1kzk+bJ8urePBAjnL

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ko0zo.ddns.net:1177

Mutex

a0e636024fac314e8f41b1a79965670d

Attributes
  • reg_key

    a0e636024fac314e8f41b1a79965670d

  • splitter

    |'|'|

Targets

    • Target

      1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42

    • Size

      440KB

    • MD5

      c4685f33c8dbb6aa3fbdcb4f1d7d4aac

    • SHA1

      f6a75a55beedf019fdc23c65cefce1b3e829bc9a

    • SHA256

      1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42

    • SHA512

      78bd77b5c9646406fb3a12ee0ad93bb44a5c8dd7d5c07415d7a22528c68b55e7c70b6b7dac6f92370fe715f03ec61529e55e9278c2ffc2a7f13eb5512afaa056

    • SSDEEP

      12288:RtztJcg9EmcjJowktoOAbE928urH+DjBAjnL/:nztJ1kzk+bJ8urePBAjnL

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks