General

  • Target

    043e344c6cc9477cbcfc0a483b1ca568.bin

  • Size

    11KB

  • Sample

    230326-bdgdfaeh63

  • MD5

    114a70e6aecf729cb4110f2bf271b1bd

  • SHA1

    0da9fa11378a4c4bcd0c2e03a7d277e0498d343e

  • SHA256

    bcaed85335595e6774d3787aec232b7468c68095f0de5a14e5f7364b6ca2cf7e

  • SHA512

    98a975c8d98de39525dcef8138b72e0e5cdf0a00467bdfa46b6b574e29839542ca05abd835d15f1441da42fc4305b7711b87d1c35ed106abe9839bbaacaab15a

  • SSDEEP

    192:1Hvkg2Bc9GwP4No0s52eUIDaHTXHZaP8sbhImANt6E4udSJKxNYpxYtsFiBft:Ncg2Bc9rP4Nfo2e1GT5ajdGUQdSAQ8nt

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

plug-in

C2

0.tcp.ap.ngrok.io:10881

Mutex

6ca646ee7571a205268803e929e9d247

Attributes
  • reg_key

    6ca646ee7571a205268803e929e9d247

  • splitter

    |'|'|

Targets

    • Target

      424f837c55e7216646a63f6bbbbba766ed7521273ddfce6edad4b6335bf7a36e.exe

    • Size

      23KB

    • MD5

      043e344c6cc9477cbcfc0a483b1ca568

    • SHA1

      52c4391b1a91c828823107cdf2db92e7142073d6

    • SHA256

      424f837c55e7216646a63f6bbbbba766ed7521273ddfce6edad4b6335bf7a36e

    • SHA512

      a705ac4259f754bea7ee73397fd1e1fc131c7d74065048020f520f63120ff1fee1355b6abfea645fd1b4d4aef8ab6da6ab0ad10346854d93463672e72ff032a5

    • SSDEEP

      384:LMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZWe:Eb9glF51LRpcnuq

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks