General

  • Target

    029742967f16b9ef929b86538afd2e9a

  • Size

    93KB

  • Sample

    231229-ywbl8scbd7

  • MD5

    029742967f16b9ef929b86538afd2e9a

  • SHA1

    74e05346e692347f4d2a0ffbce37300f48dc51aa

  • SHA256

    9b9252b4550f98cad09bf6e308cde6416c26cf43b61335ccdf887bfc59252a14

  • SHA512

    dbfe1505190b98e56e939f406edf6c01aec8a0f73d7c877eeec8184cbaa643ff98e6c340d9239bd425f0dcdcde38f0e2edc47f8e61f74bbca7372c546b503db4

  • SSDEEP

    1536:aJXBNvGfr2p4dTa/hDjEwzGi1dD+DpgS:aJOfr2p4dW/Gi1dom

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

tankionlain

C2

hakim32.ddns.net:2000

31.200.227.154:8921

Mutex

a26e4b0a02a26e725ae8b51dba8a5a6d

Attributes
  • reg_key

    a26e4b0a02a26e725ae8b51dba8a5a6d

  • splitter

    |'|'|

Targets

    • Target

      029742967f16b9ef929b86538afd2e9a

    • Size

      93KB

    • MD5

      029742967f16b9ef929b86538afd2e9a

    • SHA1

      74e05346e692347f4d2a0ffbce37300f48dc51aa

    • SHA256

      9b9252b4550f98cad09bf6e308cde6416c26cf43b61335ccdf887bfc59252a14

    • SHA512

      dbfe1505190b98e56e939f406edf6c01aec8a0f73d7c877eeec8184cbaa643ff98e6c340d9239bd425f0dcdcde38f0e2edc47f8e61f74bbca7372c546b503db4

    • SSDEEP

      1536:aJXBNvGfr2p4dTa/hDjEwzGi1dD+DpgS:aJOfr2p4dW/Gi1dom

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks