General

  • Target

    Server.bat

  • Size

    93KB

  • Sample

    230203-ehwkpsaf43

  • MD5

    8cdf279cca1384f36a510601bae6b859

  • SHA1

    bebea1ea912c0d8ab62b655493ca9ae3b9b01571

  • SHA256

    4b70ee9f32c5430d5e71094bc2fa7aabb65498fc2e6305220099f724cf4622c5

  • SHA512

    593c90221f95ae25cba96432288f023a4c10501c10cd7d5ad6fe6aa06c64e2a2c909ea7972c334944498af8f6e3cf9d3f402b342377b0c8ef73cd03aacdb0190

  • SSDEEP

    768:eY3txVMaLJ7chQgIKt0eBD+QhnXlha8zGwCpXxrjEtCdnl2pi1Rz4Rk3ssGdpRgM:vx6alYIKx5+QdT6rjEwzGi1dDkDRgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

FRANSESCOTI3LjAuFRANSESCOC4x:MTQ0NA==

Mutex

656796098a723ea39abbbeb6ecb22ca8

Attributes
  • reg_key

    656796098a723ea39abbbeb6ecb22ca8

  • splitter

    |'|'|

Targets

    • Target

      Server.bat

    • Size

      93KB

    • MD5

      8cdf279cca1384f36a510601bae6b859

    • SHA1

      bebea1ea912c0d8ab62b655493ca9ae3b9b01571

    • SHA256

      4b70ee9f32c5430d5e71094bc2fa7aabb65498fc2e6305220099f724cf4622c5

    • SHA512

      593c90221f95ae25cba96432288f023a4c10501c10cd7d5ad6fe6aa06c64e2a2c909ea7972c334944498af8f6e3cf9d3f402b342377b0c8ef73cd03aacdb0190

    • SSDEEP

      768:eY3txVMaLJ7chQgIKt0eBD+QhnXlha8zGwCpXxrjEtCdnl2pi1Rz4Rk3ssGdpRgM:vx6alYIKx5+QdT6rjEwzGi1dDkDRgS

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks