General

  • Target

    2e03834fdaf9f6005621d822e3f20676230c991fec7cd9471fd30b18a861e799N

  • Size

    23KB

  • Sample

    240919-wc8rhs1gjb

  • MD5

    6ec1a57ed360d5b15d82d6b7772c5140

  • SHA1

    e9212ce75826a6c8170ca97c351fda341ad26946

  • SHA256

    2e03834fdaf9f6005621d822e3f20676230c991fec7cd9471fd30b18a861e799

  • SHA512

    e2dea6645542690628b1f6292b0b0051f8e85cf41286f08dadce37961cd00113a91ebcacc352ad50cff4113285ea1e572f31eb414f3d937cf0d04e18c3d68636

  • SSDEEP

    384:X8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZd5F:sXcwt3tRpcnue

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.0.0.50:5552

Mutex

4e423ffcc07fbe7123b3e1a63521f9ba

Attributes
  • reg_key

    4e423ffcc07fbe7123b3e1a63521f9ba

  • splitter

    |'|'|

Targets

    • Target

      2e03834fdaf9f6005621d822e3f20676230c991fec7cd9471fd30b18a861e799N

    • Size

      23KB

    • MD5

      6ec1a57ed360d5b15d82d6b7772c5140

    • SHA1

      e9212ce75826a6c8170ca97c351fda341ad26946

    • SHA256

      2e03834fdaf9f6005621d822e3f20676230c991fec7cd9471fd30b18a861e799

    • SHA512

      e2dea6645542690628b1f6292b0b0051f8e85cf41286f08dadce37961cd00113a91ebcacc352ad50cff4113285ea1e572f31eb414f3d937cf0d04e18c3d68636

    • SSDEEP

      384:X8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZd5F:sXcwt3tRpcnue

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks