General

  • Target

    e626dd6a23a90e2a7e6792020ee3fa20N

  • Size

    23KB

  • Sample

    240914-pf6b8sshql

  • MD5

    e626dd6a23a90e2a7e6792020ee3fa20

  • SHA1

    afe7bf6067c87013669fd905169be6fcf2ac0c12

  • SHA256

    e6bfd08fca7a0f8ffcff6dcc4600a4b923cedd98de83af599670bfaeeba13c92

  • SHA512

    638bace0d38ff6e50a2f4e1b234984a6423e1c8dc867e23b996f0bfa2781cb926e671fa9ba65a6183f746f06663374b26098acbd5cf096f2280872b36af6d999

  • SSDEEP

    384:bluBPiZCMfdfSJrQbsLRGSIxYVL46fg/i8BD9BmRvR6JZlbw8hqIusZzZ0ZH:kOmhtIURpcnuZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

server10-52663.portmap.host:52663

Mutex

96e1a4795100058feca2324d7a804145

Attributes
  • reg_key

    96e1a4795100058feca2324d7a804145

  • splitter

    |'|'|

Targets

    • Target

      e626dd6a23a90e2a7e6792020ee3fa20N

    • Size

      23KB

    • MD5

      e626dd6a23a90e2a7e6792020ee3fa20

    • SHA1

      afe7bf6067c87013669fd905169be6fcf2ac0c12

    • SHA256

      e6bfd08fca7a0f8ffcff6dcc4600a4b923cedd98de83af599670bfaeeba13c92

    • SHA512

      638bace0d38ff6e50a2f4e1b234984a6423e1c8dc867e23b996f0bfa2781cb926e671fa9ba65a6183f746f06663374b26098acbd5cf096f2280872b36af6d999

    • SSDEEP

      384:bluBPiZCMfdfSJrQbsLRGSIxYVL46fg/i8BD9BmRvR6JZlbw8hqIusZzZ0ZH:kOmhtIURpcnuZ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.