General

  • Target

    2ba21ca24a909b87fa0b0ec5c7cf0c0fa10ee27a7831ebd3c6ae59c5f7827b1a

  • Size

    23KB

  • Sample

    240829-y75dpazbqe

  • MD5

    18562deb52f68e41a21a63f9f31ed942

  • SHA1

    35a08b1b59e5ff54d6195bc6a13a55745ceac3b5

  • SHA256

    2ba21ca24a909b87fa0b0ec5c7cf0c0fa10ee27a7831ebd3c6ae59c5f7827b1a

  • SHA512

    cf8a58cc3cf7d228bef04831b2b0293f2f12ddac2f1524b79849b2b6bd02a8ea6a9ef6f7cc2e23d4d4581036e2a46dc06afc79454741597e5135d74ae1d84368

  • SSDEEP

    384:w8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZxD:/Xcwt3tRpcnum

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.126.128:5552

Mutex

7ac3eec773987ee3090bbd41c1e81fe5

Attributes
  • reg_key

    7ac3eec773987ee3090bbd41c1e81fe5

  • splitter

    |'|'|

Targets

    • Target

      2ba21ca24a909b87fa0b0ec5c7cf0c0fa10ee27a7831ebd3c6ae59c5f7827b1a

    • Size

      23KB

    • MD5

      18562deb52f68e41a21a63f9f31ed942

    • SHA1

      35a08b1b59e5ff54d6195bc6a13a55745ceac3b5

    • SHA256

      2ba21ca24a909b87fa0b0ec5c7cf0c0fa10ee27a7831ebd3c6ae59c5f7827b1a

    • SHA512

      cf8a58cc3cf7d228bef04831b2b0293f2f12ddac2f1524b79849b2b6bd02a8ea6a9ef6f7cc2e23d4d4581036e2a46dc06afc79454741597e5135d74ae1d84368

    • SSDEEP

      384:w8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZxD:/Xcwt3tRpcnum

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks