General

  • Target

    4234d24b653fccceafb526c5a275fd78

  • Size

    378KB

  • Sample

    240229-vs238sga36

  • MD5

    4234d24b653fccceafb526c5a275fd78

  • SHA1

    a20603c251fffb1ca5f01b1a7b9fbc58e2a4455c

  • SHA256

    c3c035b0d9b92037507ef740ca0beb639da4818a8918089ea2174ed3b87d0bd9

  • SHA512

    19816033d37483e9a4984d5f7651340410cda297befcefb0f455b21463d6680d2ae979995ef3b4002c59abbf56695f7dbd1048b8c541bf09574201be71109b01

  • SSDEEP

    6144:Kgenlh9zNwdEt742ec+WEO7BClHIZTAE3LbAqhSFwUAuS0qNzgUT:Kgelh9hWu3Xrvk9I6ULsqYAtFz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ocpanel.hackcrack.io:36026

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Target

      4234d24b653fccceafb526c5a275fd78

    • Size

      378KB

    • MD5

      4234d24b653fccceafb526c5a275fd78

    • SHA1

      a20603c251fffb1ca5f01b1a7b9fbc58e2a4455c

    • SHA256

      c3c035b0d9b92037507ef740ca0beb639da4818a8918089ea2174ed3b87d0bd9

    • SHA512

      19816033d37483e9a4984d5f7651340410cda297befcefb0f455b21463d6680d2ae979995ef3b4002c59abbf56695f7dbd1048b8c541bf09574201be71109b01

    • SSDEEP

      6144:Kgenlh9zNwdEt742ec+WEO7BClHIZTAE3LbAqhSFwUAuS0qNzgUT:Kgelh9hWu3Xrvk9I6ULsqYAtFz

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks