General

  • Target

    24b2856cb9840f3b7131827e32cb73c9.bin

  • Size

    13KB

  • Sample

    230425-bgv11aff47

  • MD5

    10a81f776a039c03c237a411a4406c7b

  • SHA1

    e307db01ef03b7cabf545ec25e5506670ac71d24

  • SHA256

    944b9d19590f1a55e501dd1305968a718c2cbcc25ec4eeaba4b31d2ffae2e328

  • SHA512

    054a9040282d7076a0361a2756b3dab6a15c8c1e50755214670d00e0068bb6cef95726db01c16903cb3302eb4fa506414474cff7969acc32353bff6430d421dd

  • SSDEEP

    384:p8WUz6VwZxLoIKOADPceaqUi9Z+8Ycp5SA/Z0u:ppUz6VmoILgPhaqJ90dcp5SAB0u

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

amazon.thedreamsop.com:2211

Mutex

Microsoft® Windows® Operating System

Attributes
  • reg_key

    Microsoft® Windows® Operating System

  • splitter

    |'|'|

Targets

    • Target

      c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe

    • Size

      34KB

    • MD5

      24b2856cb9840f3b7131827e32cb73c9

    • SHA1

      306e69487143bb3756cba328f20aa55a3482c38c

    • SHA256

      c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22

    • SHA512

      8fef74742bca9faec30c144e9eec5e8fc4ac8f6d1fc1f680a2cf278c6511e6d1d11746e882a406b0cc2d79194a31c16e523930cc8f2866617c2f6232dc20b3e7

    • SSDEEP

      768:b717qEQ4Un/guyq6tZ1f+escElzYcHeIm:b717Q4sDF6Z1mesbEI

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks