General

  • Target

    456c297ee58a7d337360836ce73ac700N

  • Size

    184KB

  • Sample

    240912-abqcws1akk

  • MD5

    456c297ee58a7d337360836ce73ac700

  • SHA1

    87ee25a235e382dfa8b82cad086feb46575faeae

  • SHA256

    e344064b9c7a3863c15f39a7c34ce583f0e0f822acce5483cc5d82475230ee7a

  • SHA512

    15219d42d4fc01fb24cd84be725752d67a0da3183193ca7a52205202d5203bfe133345afe6b44f3a873f0f5b181e2b6616fb71bdcbb6a5675e32f90059fb776c

  • SSDEEP

    3072:dBV4RZJjae2uEvCGh3w8XBiGr13Xaiao1v4xyML8J86X/:dH4vJjt2uEKGpw8XvIq1Ej6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

31.215.173.15:5552

Mutex

84774431e5310e236d661db9ce8f427a

Attributes
  • reg_key

    84774431e5310e236d661db9ce8f427a

  • splitter

    |'|'|

Targets

    • Target

      456c297ee58a7d337360836ce73ac700N

    • Size

      184KB

    • MD5

      456c297ee58a7d337360836ce73ac700

    • SHA1

      87ee25a235e382dfa8b82cad086feb46575faeae

    • SHA256

      e344064b9c7a3863c15f39a7c34ce583f0e0f822acce5483cc5d82475230ee7a

    • SHA512

      15219d42d4fc01fb24cd84be725752d67a0da3183193ca7a52205202d5203bfe133345afe6b44f3a873f0f5b181e2b6616fb71bdcbb6a5675e32f90059fb776c

    • SSDEEP

      3072:dBV4RZJjae2uEvCGh3w8XBiGr13Xaiao1v4xyML8J86X/:dH4vJjt2uEKGpw8XvIq1Ej6

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks