General

  • Target

    dd08c6e70c10263a9d89aa1583877ff17cff4f1c6bd9131184c878f0f840d815N

  • Size

    23KB

  • Sample

    240921-1lgrlsvhnf

  • MD5

    e3c46c4883a0472325f6330b85706d90

  • SHA1

    8c021f55a4d61816213b1dac220cfe85ce98451d

  • SHA256

    dd08c6e70c10263a9d89aa1583877ff17cff4f1c6bd9131184c878f0f840d815

  • SHA512

    326bc3d37437cd752b867f493b1d099e0535d0b8ee038581a8ade75fcb10d0ad53890df1823285ca2df14d196342764326c6a172479fd9f96c4127236d422e71

  • SSDEEP

    384:8oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIh:r7O89p2rRpcnuP

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      dd08c6e70c10263a9d89aa1583877ff17cff4f1c6bd9131184c878f0f840d815N

    • Size

      23KB

    • MD5

      e3c46c4883a0472325f6330b85706d90

    • SHA1

      8c021f55a4d61816213b1dac220cfe85ce98451d

    • SHA256

      dd08c6e70c10263a9d89aa1583877ff17cff4f1c6bd9131184c878f0f840d815

    • SHA512

      326bc3d37437cd752b867f493b1d099e0535d0b8ee038581a8ade75fcb10d0ad53890df1823285ca2df14d196342764326c6a172479fd9f96c4127236d422e71

    • SSDEEP

      384:8oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIh:r7O89p2rRpcnuP

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks