General

  • Target

    27bf4c111c9278252bbe6a601df25d20N

  • Size

    23KB

  • Sample

    240909-s8njnsydja

  • MD5

    27bf4c111c9278252bbe6a601df25d20

  • SHA1

    3fcaf1ccc268897203806499aab83286162c26a3

  • SHA256

    f8dec0f23808281a89b159c36c032fa81ef279fa64cc39c30ad4f3d253cb514a

  • SHA512

    009c8eb45b49457171b8047fcae76916713718b8923689414be4f3287d780e36ec60dfdd04de7e23d1ba4aa64ad9ea06aa6ee7eb10974ad0a5e1d4b5d45074a8

  • SSDEEP

    384:IslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ6A:xeEvwIlLMRpcnug

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.10.10:5552

Mutex

0dc24807523d3cd24b54cd0996e4c49b

Attributes
  • reg_key

    0dc24807523d3cd24b54cd0996e4c49b

  • splitter

    |'|'|

Targets

    • Target

      27bf4c111c9278252bbe6a601df25d20N

    • Size

      23KB

    • MD5

      27bf4c111c9278252bbe6a601df25d20

    • SHA1

      3fcaf1ccc268897203806499aab83286162c26a3

    • SHA256

      f8dec0f23808281a89b159c36c032fa81ef279fa64cc39c30ad4f3d253cb514a

    • SHA512

      009c8eb45b49457171b8047fcae76916713718b8923689414be4f3287d780e36ec60dfdd04de7e23d1ba4aa64ad9ea06aa6ee7eb10974ad0a5e1d4b5d45074a8

    • SSDEEP

      384:IslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ6A:xeEvwIlLMRpcnug

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks