General

  • Target

    1f8682eae15d13bc358d5e7e20795887032f4b533d3b4210bded14448fb4ecc7

  • Size

    23KB

  • Sample

    240831-xtpweazgqq

  • MD5

    96795f99f9dd2b59b042964004acde86

  • SHA1

    0838a91ceb2faf90c4dba6a5d3f68963662a3d0e

  • SHA256

    1f8682eae15d13bc358d5e7e20795887032f4b533d3b4210bded14448fb4ecc7

  • SHA512

    1bf62161a7c57b70725a8fa744d3eed4a00389b416116519f22de6f5f89c4b6c7e740612e8fba8574c0bf707eb90a6d3e835c6b87d7a9a61414c0d6d7bb881d2

  • SSDEEP

    384:y+IGwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZME:/wTbC81NgRpcnum

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:9977

Mutex

ffeaa9a52c9123bb4dd974006293187b

Attributes
  • reg_key

    ffeaa9a52c9123bb4dd974006293187b

  • splitter

    |'|'|

Targets

    • Target

      1f8682eae15d13bc358d5e7e20795887032f4b533d3b4210bded14448fb4ecc7

    • Size

      23KB

    • MD5

      96795f99f9dd2b59b042964004acde86

    • SHA1

      0838a91ceb2faf90c4dba6a5d3f68963662a3d0e

    • SHA256

      1f8682eae15d13bc358d5e7e20795887032f4b533d3b4210bded14448fb4ecc7

    • SHA512

      1bf62161a7c57b70725a8fa744d3eed4a00389b416116519f22de6f5f89c4b6c7e740612e8fba8574c0bf707eb90a6d3e835c6b87d7a9a61414c0d6d7bb881d2

    • SSDEEP

      384:y+IGwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZME:/wTbC81NgRpcnum

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks