General

  • Target

    8fa0588a7d0bdc6ed5cd187ab077cdfed96f0cb1341b37e5000a5a40bbc7345e.zip

  • Size

    166KB

  • Sample

    231008-jct7xaaf2z

  • MD5

    cdb8442ef329f1cce8e6e946c3323c7e

  • SHA1

    0da32507b2d6a7b885d6083e2fac9883a6a00478

  • SHA256

    4343db61e059b8f73e97e022907d917a6a495439cf9ef7c618a832ded1f9f4d1

  • SHA512

    d05877897af51ff2d062b6069f07ec87a411a6887dc84f070b168bfb69cf089a45dc1d65009a5107df926bb4238c9d7747b910a7801686c8250e6e5c8d34d70e

  • SSDEEP

    3072:pgAfoMcj+2MZ6qGe68u2EZNVXvYImr1uX8Kp76aOKPvdkYAmK442tBB1SGIkS:pzAvIQne/u2+/Y/rwZpmaO4bp42tBBI

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

z-shadowxxx.ddns.net:5552

Mutex

1899f7b6bb5e1cf84a5b2c830a70fbec

Attributes
  • reg_key

    1899f7b6bb5e1cf84a5b2c830a70fbec

  • splitter

    |'|'|

Targets

    • Target

      8fa0588a7d0bdc6ed5cd187ab077cdfed96f0cb1341b37e5000a5a40bbc7345e

    • Size

      344KB

    • MD5

      8d25c14a5b1f9cdf8f87b86481dbc471

    • SHA1

      af7d5f5f0f4b891b4e95dd444993138b581a69d4

    • SHA256

      8fa0588a7d0bdc6ed5cd187ab077cdfed96f0cb1341b37e5000a5a40bbc7345e

    • SHA512

      6fb3dbde57e30fa8d04f3a4081312bee32fe576b73dea496c7782a02dc82e3173d49a9dd13489d7acb879744ff3c96acc81efaabbff089354fcbbe00f3167338

    • SSDEEP

      3072:FEaNdCsfYDogE/eaBNDjh8b5hisx0x0a37K0OMwRbHpG9ua7zwo58T:FEAdCs3XLBtjhij0xfm0VKG9oy

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks