General

  • Target

    c933466c7a864f5b458f445427f335296822e3774a219951dbc803b6cb011dfc

  • Size

    643KB

  • Sample

    221126-cc7pnsge9x

  • MD5

    2370a191b31e1b41b2bd803740405c0a

  • SHA1

    fac7a8a6f7ccfc910c5bc0faab2daed4e69bf922

  • SHA256

    c933466c7a864f5b458f445427f335296822e3774a219951dbc803b6cb011dfc

  • SHA512

    aecaeded73d23d110222f729d7c31aed49ee621cd1ab39b75f048d6831e0940d8a811ab459d1c26b62010bed5cd55a3ed7d3c8198fede77b499b3ecd00ae9596

  • SSDEEP

    12288:xS4AGxG7sAQ0nrjEsGh3PazbfkyNxNG8hUGjVO95K7tbKd+B//W9Di:lAGxZAQgGh3qrkkxNbOSo52bES//ADi

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

طلياني ذو الفقار

C2

murtadha1233.ddns.net:3546

Mutex

bbbe3c05a425e3d90a440ccd640f4d4a

Attributes
  • reg_key

    bbbe3c05a425e3d90a440ccd640f4d4a

  • splitter

    |'|'|

Targets

    • Target

      DotBundle.exe

    • Size

      721KB

    • MD5

      7961af50b6a6802d418e02717ec1744f

    • SHA1

      bea5538b4336b8443caadd0b4ebc405850982fe8

    • SHA256

      0ee0b78189f94c5f95f84aca68d6718554938a714157af2c939a00a5d606a7a7

    • SHA512

      d859792d648e463f77f51ea1375320adff97db4dca0c2602442329fb970651d1d8f8214e8312a0c5cb635ec62f2d59f167036d4d5dd39be64ddad977681e444c

    • SSDEEP

      12288:IQ/Z6mhgZIuDBo9dn4GgLnK2hZPSggmwQLvu/K9HLPISgd/YUQYqOKopVG60r:n/ZHhzgBCd4T1LOm92YpiZqhoM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks