General

  • Target

    82b5a15803907f9ac27999f1eb022090N.exe

  • Size

    23KB

  • Sample

    240830-njajas1fpg

  • MD5

    82b5a15803907f9ac27999f1eb022090

  • SHA1

    29691b9cdf0ae2cd6f0e4abebaa47be3504876d0

  • SHA256

    22cb011beedf2388cb161009c6b541b9ff8830081818bf015d28265ec082dc69

  • SHA512

    89af69fe77b26ad8df6c972392e0428df8407b754b941a18d4ecc8ffd645d3204a71e60899dee2c5f3c01cfc56d0c763fe717f3aba31b6edc0548d8f8e6f9942

  • SSDEEP

    384:UoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIA:D7O89p2rRpcnu6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      82b5a15803907f9ac27999f1eb022090N.exe

    • Size

      23KB

    • MD5

      82b5a15803907f9ac27999f1eb022090

    • SHA1

      29691b9cdf0ae2cd6f0e4abebaa47be3504876d0

    • SHA256

      22cb011beedf2388cb161009c6b541b9ff8830081818bf015d28265ec082dc69

    • SHA512

      89af69fe77b26ad8df6c972392e0428df8407b754b941a18d4ecc8ffd645d3204a71e60899dee2c5f3c01cfc56d0c763fe717f3aba31b6edc0548d8f8e6f9942

    • SSDEEP

      384:UoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIA:D7O89p2rRpcnu6

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks