General

  • Target

    1936-62-0x0000000000180000-0x00000000001C0000-memory.dmp

  • Size

    256KB

  • Sample

    230320-wsbrqagg7x

  • MD5

    448c9859b4e7e9c79e6ea34402f1aa69

  • SHA1

    f4044d5925f5dd4ba15cd9be1de1e408069410d2

  • SHA256

    5b88f3a2527be5fe528962f7a84102e8415987d0f9648be382897da8511b8ba3

  • SHA512

    d29cd9be1b63d848890829abe9742e2041dcea4c68d886e14c072c696a004673bdd72a83f8423c7ea4d59ff313bf0d9a042d278a8892be030b3176bb6d90675b

  • SSDEEP

    6144:mp3luhhPpL4hKXkEAk+p8pggenVd4hE1slKBYu:mdAL1u1a+qggenVOS1sl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

activation

C2

jesus141.ddns.net:1177

Mutex

6d25f7965ae661e73d43f8d5326b3959

6d25f7965ae661e73d43f8d5326b3959

6d25f7965ae661e73d43f8d5326b3959

Attributes
  • reg_key

    6d25f7965ae661e73d43f8d5326b3959

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      1936-62-0x0000000000180000-0x00000000001C0000-memory.dmp

    • Size

      256KB

    • MD5

      448c9859b4e7e9c79e6ea34402f1aa69

    • SHA1

      f4044d5925f5dd4ba15cd9be1de1e408069410d2

    • SHA256

      5b88f3a2527be5fe528962f7a84102e8415987d0f9648be382897da8511b8ba3

    • SHA512

      d29cd9be1b63d848890829abe9742e2041dcea4c68d886e14c072c696a004673bdd72a83f8423c7ea4d59ff313bf0d9a042d278a8892be030b3176bb6d90675b

    • SSDEEP

      6144:mp3luhhPpL4hKXkEAk+p8pggenVd4hE1slKBYu:mdAL1u1a+qggenVOS1sl

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks