General

  • Target

    0fbd44c0822387461816967898b57865.exe

  • Size

    636KB

  • Sample

    240101-yn88jabef4

  • MD5

    0fbd44c0822387461816967898b57865

  • SHA1

    5bdff7cd36e866e6d5f122b5d18e871653740ab4

  • SHA256

    edba8ccd7dfdd0f156fb80183439684faf4aa2f70f131d4ee192e73e12e72f0f

  • SHA512

    aa783b078e3a1e65fe8ff3597eb1dffc7d1267cf9bbe50b8d32dc39dcb9673bebcfed7743b4a31114c9dad4a5bd0df35978ad87c83525b7a82d805245fc0e78b

  • SSDEEP

    12288:Uzpeojs6NrsfWa/G2oy9bawFkHaW6Ofm1VHV:UYEE/9baXaW6Oc1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Destroyer

C2

plankxd.ddns.net:1177

Mutex

2f806f40c5d4533d860b3bd9e1a2b698

Attributes
  • reg_key

    2f806f40c5d4533d860b3bd9e1a2b698

  • splitter

    |'|'|

Targets

    • Target

      0fbd44c0822387461816967898b57865.exe

    • Size

      636KB

    • MD5

      0fbd44c0822387461816967898b57865

    • SHA1

      5bdff7cd36e866e6d5f122b5d18e871653740ab4

    • SHA256

      edba8ccd7dfdd0f156fb80183439684faf4aa2f70f131d4ee192e73e12e72f0f

    • SHA512

      aa783b078e3a1e65fe8ff3597eb1dffc7d1267cf9bbe50b8d32dc39dcb9673bebcfed7743b4a31114c9dad4a5bd0df35978ad87c83525b7a82d805245fc0e78b

    • SSDEEP

      12288:Uzpeojs6NrsfWa/G2oy9bawFkHaW6Ofm1VHV:UYEE/9baXaW6Oc1

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks