General

  • Target

    fa751a76c642d964037f4bd88db04e30N.exe

  • Size

    172KB

  • Sample

    240830-mm9bcs1cpq

  • MD5

    fa751a76c642d964037f4bd88db04e30

  • SHA1

    02c7346af3816c4f61a4a47c016bdfd0c88afedd

  • SHA256

    36e5ac444af1ddf8dfa1f67132ec053430ef93c2212a1b6463bc165bd2d00b49

  • SHA512

    6680b1e37d872755ef2e584724047f3e7d7857f460d61eb7484f5490e24c58453782bbc0782c14f3f34940efe5cdc6ed5c350596ced1e0ed3611114c920f3fdf

  • SSDEEP

    3072:QxnTTbBgKZvq08p1MS1BllY7aYtLH9NHTuVIT2U2y:uNZ8p17y7d9JTQIT2U2

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

bytet.ddns.net:5552

Mutex

3fb8a2ca84b8925e17882e2cb765f819

Attributes
  • reg_key

    3fb8a2ca84b8925e17882e2cb765f819

  • splitter

    |'|'|

Targets

    • Target

      fa751a76c642d964037f4bd88db04e30N.exe

    • Size

      172KB

    • MD5

      fa751a76c642d964037f4bd88db04e30

    • SHA1

      02c7346af3816c4f61a4a47c016bdfd0c88afedd

    • SHA256

      36e5ac444af1ddf8dfa1f67132ec053430ef93c2212a1b6463bc165bd2d00b49

    • SHA512

      6680b1e37d872755ef2e584724047f3e7d7857f460d61eb7484f5490e24c58453782bbc0782c14f3f34940efe5cdc6ed5c350596ced1e0ed3611114c920f3fdf

    • SSDEEP

      3072:QxnTTbBgKZvq08p1MS1BllY7aYtLH9NHTuVIT2U2y:uNZ8p17y7d9JTQIT2U2

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks