General

  • Target

    5de1c86bbf0d53ddf515d5fb881a204b3c940532f8ed315eff00ccedca4d4ea1N

  • Size

    23KB

  • Sample

    240917-3dmc8szgpa

  • MD5

    f270f041ab3607a66d0f0e641ba45670

  • SHA1

    c358d95f5eb1581fd01c5e6f17aed6ccfd255568

  • SHA256

    5de1c86bbf0d53ddf515d5fb881a204b3c940532f8ed315eff00ccedca4d4ea1

  • SHA512

    249eff439fe345e0a0980682e6e15b84057cd208436c4be6324d4801d87ef167f66fab97a53622c8709d93eb0441a5b0fbd317e4549b05d54a26ef76db81fc0f

  • SSDEEP

    384:Kwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZgy:pTbC81NgRpcnuM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.10.134:5552

Mutex

137dde66f92b5e67080696d92bea7f25

Attributes
  • reg_key

    137dde66f92b5e67080696d92bea7f25

  • splitter

    |'|'|

Targets

    • Target

      5de1c86bbf0d53ddf515d5fb881a204b3c940532f8ed315eff00ccedca4d4ea1N

    • Size

      23KB

    • MD5

      f270f041ab3607a66d0f0e641ba45670

    • SHA1

      c358d95f5eb1581fd01c5e6f17aed6ccfd255568

    • SHA256

      5de1c86bbf0d53ddf515d5fb881a204b3c940532f8ed315eff00ccedca4d4ea1

    • SHA512

      249eff439fe345e0a0980682e6e15b84057cd208436c4be6324d4801d87ef167f66fab97a53622c8709d93eb0441a5b0fbd317e4549b05d54a26ef76db81fc0f

    • SSDEEP

      384:Kwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZgy:pTbC81NgRpcnuM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks