General

  • Target

    njRAT.zip

  • Size

    349KB

  • Sample

    240710-eqt2vaxgkc

  • MD5

    8d6d88365875dde55078c005fc496370

  • SHA1

    649d93d699164a5f4f1b8c5ee7088c67ca521af7

  • SHA256

    00db602f19cde43d3f953560af9e3a94f76361b6c1274f8cd361c09fb56d93f8

  • SHA512

    3f1e9cbb4ea938b3dd514b49af51dcf3827756fb679619171018c1fe562669602eb8f31b7d3ca1f1bbd58f1a900b55afdaf724d819172747a16eefe19516003b

  • SSDEEP

    6144:YeAmDxawiyxe6x0esoo9/v6rF/U65Co/f3/neqBf4gkU5F6W6sGdfXM6m:YeAmownE66es7Yp/h/f3feqBkESO

Malware Config

Targets

    • Target

      njRAT.exe

    • Size

      959KB

    • MD5

      0431311b5f024d6e66b90d59491f2563

    • SHA1

      e9ff4da7e3f2199cbc16d37d8935cb1b0567ac2a

    • SHA256

      fd624aa205517580e83fad7a4ce4d64863e95f62b34ac72647b1974a52822199

    • SHA512

      d44b14e4b24e6e2d506ec32098488a16ebd5df57499ecd85e8878b8af2a3e1f9ed20d4125836417b702d0571f992aeac07af051dbf9268f48954556d17f51ee2

    • SSDEEP

      12288:+O9vE3J7JO+xEPuc//9wivAmv6SAbnzmip2hGnadlFM4ZHOT2:+eXuczPCSGnzVjad1

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks