General

  • Target

    2c0296f6aa1e43ddd6f45b47312b9a90N

  • Size

    37KB

  • Sample

    240913-21kmgsvbna

  • MD5

    2c0296f6aa1e43ddd6f45b47312b9a90

  • SHA1

    c97b950e463cbbac1fbf56984ee49c803580e51e

  • SHA256

    b7636040051527e7ab3f4745f1cfd2260d74d64a646666d88b678adbf24142a1

  • SHA512

    3ed6a4884fe426b37d177ecde0f4a5a49ed7f842ea29c9fd0c2a238bfda311ff44539d3cf9ef78712b4ecb5e466820775b722dbc0bf1eb566d2fcffcb8623738

  • SSDEEP

    384:dbzoUiFmbK7FmpE8QyEfGqvR2f3KVKrAF+rMRTyN/0L+EcoinblneHQM3epzX16L:NF2n8LEfGqAfKArM+rMRa8NuT6Zt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

193.235.207.126:5865

Mutex

f1d4287beeb567a043ef46f75fb7be85

Attributes
  • reg_key

    f1d4287beeb567a043ef46f75fb7be85

  • splitter

    |'|'|

Targets

    • Target

      2c0296f6aa1e43ddd6f45b47312b9a90N

    • Size

      37KB

    • MD5

      2c0296f6aa1e43ddd6f45b47312b9a90

    • SHA1

      c97b950e463cbbac1fbf56984ee49c803580e51e

    • SHA256

      b7636040051527e7ab3f4745f1cfd2260d74d64a646666d88b678adbf24142a1

    • SHA512

      3ed6a4884fe426b37d177ecde0f4a5a49ed7f842ea29c9fd0c2a238bfda311ff44539d3cf9ef78712b4ecb5e466820775b722dbc0bf1eb566d2fcffcb8623738

    • SSDEEP

      384:dbzoUiFmbK7FmpE8QyEfGqvR2f3KVKrAF+rMRTyN/0L+EcoinblneHQM3epzX16L:NF2n8LEfGqAfKArM+rMRa8NuT6Zt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks