General

  • Target

    a34d1b5f519b3951375190074c52821a

  • Size

    31KB

  • Sample

    231222-qp9xfshahl

  • MD5

    a34d1b5f519b3951375190074c52821a

  • SHA1

    a9b7bbad71812aa8abc2936546ab4cb705b5553c

  • SHA256

    69b71ac7515f79929f3c41ca9b75d71d4eaecb450a3933b47ddfc86d4b64c667

  • SHA512

    b55de0e7b921185a78fc772a2d627712d514793d9297a652cca8a3a579ca3d35b4a2898b44834ab4fbcadac71fd727034ef28174acd672c78a9b72d0dea5045f

  • SSDEEP

    768:rnZghV5VXPKzxF+dt+XKvJ+rvaPQmIDUu0tiKtj:KfqciMQVkjj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked

C2

192.168.0.15:6522

Mutex

aed23401e9e20fc857520763aabbc3ed

Attributes
  • reg_key

    aed23401e9e20fc857520763aabbc3ed

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      a34d1b5f519b3951375190074c52821a

    • Size

      31KB

    • MD5

      a34d1b5f519b3951375190074c52821a

    • SHA1

      a9b7bbad71812aa8abc2936546ab4cb705b5553c

    • SHA256

      69b71ac7515f79929f3c41ca9b75d71d4eaecb450a3933b47ddfc86d4b64c667

    • SHA512

      b55de0e7b921185a78fc772a2d627712d514793d9297a652cca8a3a579ca3d35b4a2898b44834ab4fbcadac71fd727034ef28174acd672c78a9b72d0dea5045f

    • SSDEEP

      768:rnZghV5VXPKzxF+dt+XKvJ+rvaPQmIDUu0tiKtj:KfqciMQVkjj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks