General

  • Target

    69d96c2c29f7475d82ff72fa8947b22bb0ea4634b0c63380e859e10f19057788

  • Size

    1.1MB

  • Sample

    221127-tbc74sdd9v

  • MD5

    4021ef6424a882498dd76f03a7f3689e

  • SHA1

    dfe52ed6cb32c8c141fe9785c485c38fa58dfc31

  • SHA256

    69d96c2c29f7475d82ff72fa8947b22bb0ea4634b0c63380e859e10f19057788

  • SHA512

    21cf0af8d746737a70bf542eeb398f133b838019929579b47392a21c227d22ceff181f7b32c2574bffd48e85467e19a5d1d8bcf36bc12febf829606ad865f049

  • SSDEEP

    24576:gn1T/Ny6o0Nu0n0t0LCDL0nTC8ErRdDFmLBZ+Kk54+0Ejl:gfo0E0n0i+8nm8+jFmLBMH2+0Ejl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ali5319ali.mooo.com:5552

Mutex

0190b92c268773105ee4bc538f5d59ea

Attributes
  • reg_key

    0190b92c268773105ee4bc538f5d59ea

  • splitter

    |'|'|

Targets

    • Target

      69d96c2c29f7475d82ff72fa8947b22bb0ea4634b0c63380e859e10f19057788

    • Size

      1.1MB

    • MD5

      4021ef6424a882498dd76f03a7f3689e

    • SHA1

      dfe52ed6cb32c8c141fe9785c485c38fa58dfc31

    • SHA256

      69d96c2c29f7475d82ff72fa8947b22bb0ea4634b0c63380e859e10f19057788

    • SHA512

      21cf0af8d746737a70bf542eeb398f133b838019929579b47392a21c227d22ceff181f7b32c2574bffd48e85467e19a5d1d8bcf36bc12febf829606ad865f049

    • SSDEEP

      24576:gn1T/Ny6o0Nu0n0t0LCDL0nTC8ErRdDFmLBZ+Kk54+0Ejl:gfo0E0n0i+8nm8+jFmLBMH2+0Ejl

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks