General

  • Target

    e2f7bf25926cbc3651657030af2d90e57675a1818d82134f424ef5f399bd3001N

  • Size

    31KB

  • Sample

    240917-1hkn4awfrm

  • MD5

    e3e1748d9d2568a906e68e295603e340

  • SHA1

    471af2d45548dfe35ff0d29550b0b66adcfac58d

  • SHA256

    e2f7bf25926cbc3651657030af2d90e57675a1818d82134f424ef5f399bd3001

  • SHA512

    5910161f80aa3bddce57f1d1dd87df00d1775260a9954497657c164a98344e8216675b030af7fddbfa493d0ef288e5c8e859afaa44e4f1d43de2064baaa1816b

  • SSDEEP

    768:hHnTaeU+VfJFozxzC/Svev+z5vC3QmIDUu0tiwfj:douaxBAQVknj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

bttrdiscord

C2

127.0.0.1:6522

Mutex

4b39a1369a07207d174180294d33b9a8

Attributes
  • reg_key

    4b39a1369a07207d174180294d33b9a8

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      e2f7bf25926cbc3651657030af2d90e57675a1818d82134f424ef5f399bd3001N

    • Size

      31KB

    • MD5

      e3e1748d9d2568a906e68e295603e340

    • SHA1

      471af2d45548dfe35ff0d29550b0b66adcfac58d

    • SHA256

      e2f7bf25926cbc3651657030af2d90e57675a1818d82134f424ef5f399bd3001

    • SHA512

      5910161f80aa3bddce57f1d1dd87df00d1775260a9954497657c164a98344e8216675b030af7fddbfa493d0ef288e5c8e859afaa44e4f1d43de2064baaa1816b

    • SSDEEP

      768:hHnTaeU+VfJFozxzC/Svev+z5vC3QmIDUu0tiwfj:douaxBAQVknj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks