General

  • Target

    a6bf143eae02ab84964e8a49cf6ef9c9cbd6c5e07adad670d56ac82d34e211c0N

  • Size

    37KB

  • Sample

    240917-f47qjawgqe

  • MD5

    8a9098429157504effa285b38aaf4740

  • SHA1

    2437b3d3958a9063dc59e134ec0a0515b789e280

  • SHA256

    a6bf143eae02ab84964e8a49cf6ef9c9cbd6c5e07adad670d56ac82d34e211c0

  • SHA512

    6134338022b70d95a0d5d79cc978135729271d928cd337f57dcc6f7f4e330e775730af0e6ad1b189ddafc183d7e1f9b9a888e7e6bb41e5dc752bef0837798631

  • SSDEEP

    384:5uFTgiG1CRZfursvO6yszMFs/DSTHv0mkrAF+rMRTyN/0L+EcoinblneHQM3epz6:gFN5WpszMFsmjv0vrM+rMRa8NuFSt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

5f6ba7b12af2f99099038f53a8501115

Attributes
  • reg_key

    5f6ba7b12af2f99099038f53a8501115

  • splitter

    |'|'|

Targets

    • Target

      a6bf143eae02ab84964e8a49cf6ef9c9cbd6c5e07adad670d56ac82d34e211c0N

    • Size

      37KB

    • MD5

      8a9098429157504effa285b38aaf4740

    • SHA1

      2437b3d3958a9063dc59e134ec0a0515b789e280

    • SHA256

      a6bf143eae02ab84964e8a49cf6ef9c9cbd6c5e07adad670d56ac82d34e211c0

    • SHA512

      6134338022b70d95a0d5d79cc978135729271d928cd337f57dcc6f7f4e330e775730af0e6ad1b189ddafc183d7e1f9b9a888e7e6bb41e5dc752bef0837798631

    • SSDEEP

      384:5uFTgiG1CRZfursvO6yszMFs/DSTHv0mkrAF+rMRTyN/0L+EcoinblneHQM3epz6:gFN5WpszMFsmjv0vrM+rMRa8NuFSt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks