General

  • Target

    02b52a8fe7b171f01ed0d92a710e05d679cfdadb5af5ec00d0d2287113845425N

  • Size

    71KB

  • Sample

    240921-3wfnea1dqh

  • MD5

    9bc6da63746a8734e52630d4acc16b70

  • SHA1

    ec4ae894687a1eccdbc1f49e65ecc8111490bfdb

  • SHA256

    02b52a8fe7b171f01ed0d92a710e05d679cfdadb5af5ec00d0d2287113845425

  • SHA512

    656ee80aaaf746f95183c61c9818adf27d3f7ee7dd731d44324dbe8a9ac7340f12f224326c6a0614dc16120d3fa7335ea50c16394d2baa2b0f77bfdb5e9ccb20

  • SSDEEP

    1536:TMPCNW3/a6vh/WYQXa2t8q9Uk3HdlKY8i5xZJnaKghlWZ1DyAP:T2i6p/W+e939qyha5DWZ1Dyc

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed by van

C2

devilboydevilhere.strangled.net:5552

Mutex

4fe01d78ee168446922dd4aa533f849b

Attributes
  • reg_key

    4fe01d78ee168446922dd4aa533f849b

  • splitter

    |'|'|

Targets

    • Target

      02b52a8fe7b171f01ed0d92a710e05d679cfdadb5af5ec00d0d2287113845425N

    • Size

      71KB

    • MD5

      9bc6da63746a8734e52630d4acc16b70

    • SHA1

      ec4ae894687a1eccdbc1f49e65ecc8111490bfdb

    • SHA256

      02b52a8fe7b171f01ed0d92a710e05d679cfdadb5af5ec00d0d2287113845425

    • SHA512

      656ee80aaaf746f95183c61c9818adf27d3f7ee7dd731d44324dbe8a9ac7340f12f224326c6a0614dc16120d3fa7335ea50c16394d2baa2b0f77bfdb5e9ccb20

    • SSDEEP

      1536:TMPCNW3/a6vh/WYQXa2t8q9Uk3HdlKY8i5xZJnaKghlWZ1DyAP:T2i6p/W+e939qyha5DWZ1Dyc

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks