General

  • Target

    5ecc27abe51073b88b4a027d104eb27bb6090bb88ee3f57042c391929809b0fe

  • Size

    1.4MB

  • Sample

    231021-1b8gksgd8v

  • MD5

    6d7581ce66903505cdd302e804e98ccb

  • SHA1

    322c750a476e6bfcc870e32427388bdabdcf2118

  • SHA256

    5ecc27abe51073b88b4a027d104eb27bb6090bb88ee3f57042c391929809b0fe

  • SHA512

    81527134452d166b86e4375cd6f0f325a9711eef2a254baf2e049ff911ce5b56fa75c75ef94c79d9ec99fb76c45cb9888fb8547c1884d24b521a634876061758

  • SSDEEP

    24576:+TbBv5rUlIa9fkmnRRzYsrQZTnskmkORRQdKQPed9IvAIMpVNvi329DaR:ABRWfkqRRQnXOzQd3M+vAIMpb8IW

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

2.tcp.eu.ngrok.io:14984

Mutex

d43bf0cc9d9c8c523156a70be6624c0c

Attributes
  • reg_key

    d43bf0cc9d9c8c523156a70be6624c0c

  • splitter

    |'|'|

Targets

    • Target

      5ecc27abe51073b88b4a027d104eb27bb6090bb88ee3f57042c391929809b0fe

    • Size

      1.4MB

    • MD5

      6d7581ce66903505cdd302e804e98ccb

    • SHA1

      322c750a476e6bfcc870e32427388bdabdcf2118

    • SHA256

      5ecc27abe51073b88b4a027d104eb27bb6090bb88ee3f57042c391929809b0fe

    • SHA512

      81527134452d166b86e4375cd6f0f325a9711eef2a254baf2e049ff911ce5b56fa75c75ef94c79d9ec99fb76c45cb9888fb8547c1884d24b521a634876061758

    • SSDEEP

      24576:+TbBv5rUlIa9fkmnRRzYsrQZTnskmkORRQdKQPed9IvAIMpVNvi329DaR:ABRWfkqRRQnXOzQd3M+vAIMpb8IW

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks