General

  • Target

    2e6d807e953cc0961f1bae27e34bc50d

  • Size

    37KB

  • Sample

    240725-em9ccsxerm

  • MD5

    2e6d807e953cc0961f1bae27e34bc50d

  • SHA1

    6d31a3685f9d5aba311fcdd6d4d99e1f14a2075f

  • SHA256

    3588af722c9a76025bedf0cf8ea0da977652c57173cd9e360f1905c48a35f312

  • SHA512

    c1a2af38ad8c0b05676ef5f28dcb11de0504de008c016b4942199b9ba0b79d52f0e29efd98573d4d2ee81630f35de9cc5692a06fc11a6baac0066dee43df2063

  • SSDEEP

    384:99aeBaNit/FbOn0aH2ykrISXfZ8zPuvlrAF+rMRTyN/0L+EcoinblneHQM3epzXE:naD4NWtkrISviLu9rM+rMRa8Nu7Ct

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

45.83.207.67:6652

Mutex

435e5d62355646e5495fb86b5a8982b6

Attributes
  • reg_key

    435e5d62355646e5495fb86b5a8982b6

  • splitter

    |'|'|

Targets

    • Target

      2e6d807e953cc0961f1bae27e34bc50d

    • Size

      37KB

    • MD5

      2e6d807e953cc0961f1bae27e34bc50d

    • SHA1

      6d31a3685f9d5aba311fcdd6d4d99e1f14a2075f

    • SHA256

      3588af722c9a76025bedf0cf8ea0da977652c57173cd9e360f1905c48a35f312

    • SHA512

      c1a2af38ad8c0b05676ef5f28dcb11de0504de008c016b4942199b9ba0b79d52f0e29efd98573d4d2ee81630f35de9cc5692a06fc11a6baac0066dee43df2063

    • SSDEEP

      384:99aeBaNit/FbOn0aH2ykrISXfZ8zPuvlrAF+rMRTyN/0L+EcoinblneHQM3epzXE:naD4NWtkrISviLu9rM+rMRa8Nu7Ct

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks