General

  • Target

    cb6ec0075f5915620e92f73452f3f6e17a38144fa0bc6bd4c3329c59f2bdf120

  • Size

    23KB

  • Sample

    240918-bsxzqswbml

  • MD5

    c307fbd220331c943ff8cc97e757d121

  • SHA1

    63d7d6332b3dd437f3cb2f40449c9d2065a45c59

  • SHA256

    cb6ec0075f5915620e92f73452f3f6e17a38144fa0bc6bd4c3329c59f2bdf120

  • SHA512

    2c827572ac62a586cdc67bfe6af736086ff57e7fa0eae5e36e0caf062854169fb3ccc8ac5d844ddf1cdc7518eb20b7f6fb82e50178686fe0da3bc197d23612ff

  • SSDEEP

    384:YweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZ6M:/Lq411eRpcnuw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

seizer.zapto.org:1177

Mutex

2c14b3a0c6e67d40c4117fe11fd2e98f

Attributes
  • reg_key

    2c14b3a0c6e67d40c4117fe11fd2e98f

  • splitter

    |'|'|

Targets

    • Target

      cb6ec0075f5915620e92f73452f3f6e17a38144fa0bc6bd4c3329c59f2bdf120

    • Size

      23KB

    • MD5

      c307fbd220331c943ff8cc97e757d121

    • SHA1

      63d7d6332b3dd437f3cb2f40449c9d2065a45c59

    • SHA256

      cb6ec0075f5915620e92f73452f3f6e17a38144fa0bc6bd4c3329c59f2bdf120

    • SHA512

      2c827572ac62a586cdc67bfe6af736086ff57e7fa0eae5e36e0caf062854169fb3ccc8ac5d844ddf1cdc7518eb20b7f6fb82e50178686fe0da3bc197d23612ff

    • SSDEEP

      384:YweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZ6M:/Lq411eRpcnuw

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks