General

  • Target

    a4185c129f1180fbcc31930f88c115e0N.exe

  • Size

    84KB

  • Sample

    240830-tj34hasfmb

  • MD5

    a4185c129f1180fbcc31930f88c115e0

  • SHA1

    241c572d34c0b8605ab9a0899fa0c0f6617215f5

  • SHA256

    eda4271057ea7e794385758d7dc8b9caa84dddb33aa4736c6bab6b4e26989c35

  • SHA512

    fc04ddccafacaa374f6ed7b77e38a07cc460f5e61416995a94ba4a42d2c5b67e8dfae2edf7e39ec454b14759a13d8e7ed29755ce932a954e5adb7a384a7479a4

  • SSDEEP

    1536:CQ6/VKyx0RWmusniDoo6dM/67j93zrAGyNkG:X6TuUm2jR67j93zrAGyNkG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Anakim

C2

127.0.0.1:5552

Mutex

66b5284271358c0b2cfc6afda2eab063

Attributes
  • reg_key

    66b5284271358c0b2cfc6afda2eab063

  • splitter

    |'|'|

Targets

    • Target

      a4185c129f1180fbcc31930f88c115e0N.exe

    • Size

      84KB

    • MD5

      a4185c129f1180fbcc31930f88c115e0

    • SHA1

      241c572d34c0b8605ab9a0899fa0c0f6617215f5

    • SHA256

      eda4271057ea7e794385758d7dc8b9caa84dddb33aa4736c6bab6b4e26989c35

    • SHA512

      fc04ddccafacaa374f6ed7b77e38a07cc460f5e61416995a94ba4a42d2c5b67e8dfae2edf7e39ec454b14759a13d8e7ed29755ce932a954e5adb7a384a7479a4

    • SSDEEP

      1536:CQ6/VKyx0RWmusniDoo6dM/67j93zrAGyNkG:X6TuUm2jR67j93zrAGyNkG

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks