General

  • Target

    5669.exe

  • Size

    23KB

  • Sample

    240916-22knwavbmq

  • MD5

    54d2b4186f16877f6d9c77f5c5f52315

  • SHA1

    7bfadd6077d209bd73f2cd227960be137004102c

  • SHA256

    e46efa22f08a42f31bdce73cc97298818a9e59c5245b21d4876503ff3992c53b

  • SHA512

    b16c41098c8b809c00575b14aa4af60e627d2b704eee7b2a5be8e47efb86d7fcd968f11774647e31383d88022a0772e9a5d8a0686c426a5698e8a62625effe20

  • SSDEEP

    384:yMoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIp:y77O89p2rRpcnuH

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      5669.exe

    • Size

      23KB

    • MD5

      54d2b4186f16877f6d9c77f5c5f52315

    • SHA1

      7bfadd6077d209bd73f2cd227960be137004102c

    • SHA256

      e46efa22f08a42f31bdce73cc97298818a9e59c5245b21d4876503ff3992c53b

    • SHA512

      b16c41098c8b809c00575b14aa4af60e627d2b704eee7b2a5be8e47efb86d7fcd968f11774647e31383d88022a0772e9a5d8a0686c426a5698e8a62625effe20

    • SSDEEP

      384:yMoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIp:y77O89p2rRpcnuH

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks