General

  • Target

    2f7023be5cffe476559b07c7cf8035fdf6f2327ac4331effabef250164d7c263_JC.exe

  • Size

    31KB

  • Sample

    231011-2nynksbf25

  • MD5

    0000a96752417b5681728206855b2c49

  • SHA1

    38b037efedafa3a50dd98ceffea23032f939c3e5

  • SHA256

    2f7023be5cffe476559b07c7cf8035fdf6f2327ac4331effabef250164d7c263

  • SHA512

    f3b15b22068ed0af5a5c232f9ab04781ced28e84e3f7e0c96e656440ebb0a4462738a493f6cc891414822b2f53e1f3c86e2e3e5790c14703540e74f8942d49df

  • SSDEEP

    768:yLorDp8pdvXyzx9uFwna/5nW3TvanQmIDUu0tif2j:Xw68nQbkQVkzj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

dugpanan.ddns.net:2247

Mutex

cdb09b7e00330671fe79126230922d8b

Attributes
  • reg_key

    cdb09b7e00330671fe79126230922d8b

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      2f7023be5cffe476559b07c7cf8035fdf6f2327ac4331effabef250164d7c263_JC.exe

    • Size

      31KB

    • MD5

      0000a96752417b5681728206855b2c49

    • SHA1

      38b037efedafa3a50dd98ceffea23032f939c3e5

    • SHA256

      2f7023be5cffe476559b07c7cf8035fdf6f2327ac4331effabef250164d7c263

    • SHA512

      f3b15b22068ed0af5a5c232f9ab04781ced28e84e3f7e0c96e656440ebb0a4462738a493f6cc891414822b2f53e1f3c86e2e3e5790c14703540e74f8942d49df

    • SSDEEP

      768:yLorDp8pdvXyzx9uFwna/5nW3TvanQmIDUu0tif2j:Xw68nQbkQVkzj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks