General

  • Target

    610161dbe4cb7772c7c9c870d322fae9da481816543ed8ce8fd3faf71e9f2506.exe

  • Size

    23KB

  • Sample

    240726-dzsppstejq

  • MD5

    575d763178b62ffb23e318a241cb0706

  • SHA1

    4b1fe73c1ecb8265ad3f1979d7c0b119fccf89dc

  • SHA256

    610161dbe4cb7772c7c9c870d322fae9da481816543ed8ce8fd3faf71e9f2506

  • SHA512

    cae1abbe233c0872df2581233542b75cf92fadd2323c462d9049edd3f1f88400276fa2bcdf897b6c65c6bc06ec05569d04d5d5be4e1f76767f6c180305a2d386

  • SSDEEP

    384:QGwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZxO:YTbC81NgRpcnub

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.94.13.141:5552

Mutex

9d7a86c885741f54de92d8420ac76ebf

Attributes
  • reg_key

    9d7a86c885741f54de92d8420ac76ebf

  • splitter

    |'|'|

Targets

    • Target

      610161dbe4cb7772c7c9c870d322fae9da481816543ed8ce8fd3faf71e9f2506.exe

    • Size

      23KB

    • MD5

      575d763178b62ffb23e318a241cb0706

    • SHA1

      4b1fe73c1ecb8265ad3f1979d7c0b119fccf89dc

    • SHA256

      610161dbe4cb7772c7c9c870d322fae9da481816543ed8ce8fd3faf71e9f2506

    • SHA512

      cae1abbe233c0872df2581233542b75cf92fadd2323c462d9049edd3f1f88400276fa2bcdf897b6c65c6bc06ec05569d04d5d5be4e1f76767f6c180305a2d386

    • SSDEEP

      384:QGwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZxO:YTbC81NgRpcnub

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks