General

  • Target

    5b31c351ae35eff5d1db9feab78aa530N

  • Size

    37KB

  • Sample

    240907-wwktssxdlr

  • MD5

    5b31c351ae35eff5d1db9feab78aa530

  • SHA1

    c1056ae6320d74ff2f7c68e0163847ee61f64322

  • SHA256

    208981bbfc13638805c65b2b38f160866ef96f73089f10358172960742879f49

  • SHA512

    b906104290708dd4c22c718552492cd59efa7e6ef1d5e8692d7a013f05bed62dee360837f491b7ebac0c9e13716889afaf64a70989996a65e19330cbf16634ac

  • SSDEEP

    384:U/NqiUx54NLHdayszfhen9XsWiXFrAF+rMRTyN/0L+EcoinblneHQM3epzX0QNr8:ArZdJszfhex9i1rM+rMRa8NuyQmt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

netalant-45354.portmap.io:45354

Mutex

a381333f28d6355f51765e61000056f1

Attributes
  • reg_key

    a381333f28d6355f51765e61000056f1

  • splitter

    |'|'|

Targets

    • Target

      5b31c351ae35eff5d1db9feab78aa530N

    • Size

      37KB

    • MD5

      5b31c351ae35eff5d1db9feab78aa530

    • SHA1

      c1056ae6320d74ff2f7c68e0163847ee61f64322

    • SHA256

      208981bbfc13638805c65b2b38f160866ef96f73089f10358172960742879f49

    • SHA512

      b906104290708dd4c22c718552492cd59efa7e6ef1d5e8692d7a013f05bed62dee360837f491b7ebac0c9e13716889afaf64a70989996a65e19330cbf16634ac

    • SSDEEP

      384:U/NqiUx54NLHdayszfhen9XsWiXFrAF+rMRTyN/0L+EcoinblneHQM3epzX0QNr8:ArZdJszfhex9i1rM+rMRa8NuyQmt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks