General

  • Target

    71a13fa0b906c3e683fdea090e90dbf7bbdc7afb2c78b3c6f40c73a214838b94N

  • Size

    23KB

  • Sample

    240921-b8c99szbna

  • MD5

    45d712159804e80d6d6fb07c49f7fd70

  • SHA1

    d043a8c61cf643a907ef1eb9169a006ce4cb4f52

  • SHA256

    71a13fa0b906c3e683fdea090e90dbf7bbdc7afb2c78b3c6f40c73a214838b94

  • SHA512

    31f8bc80988fa363c248f5175d9d70aa5c9ec70240d44a47adf29cef6a9478c52fcbd4ded24babc9d9c5c6edd6177871ed46281c926b07e750e60a8d6b6413b7

  • SSDEEP

    384:RoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIX:G7O89p2rRpcnut

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      71a13fa0b906c3e683fdea090e90dbf7bbdc7afb2c78b3c6f40c73a214838b94N

    • Size

      23KB

    • MD5

      45d712159804e80d6d6fb07c49f7fd70

    • SHA1

      d043a8c61cf643a907ef1eb9169a006ce4cb4f52

    • SHA256

      71a13fa0b906c3e683fdea090e90dbf7bbdc7afb2c78b3c6f40c73a214838b94

    • SHA512

      31f8bc80988fa363c248f5175d9d70aa5c9ec70240d44a47adf29cef6a9478c52fcbd4ded24babc9d9c5c6edd6177871ed46281c926b07e750e60a8d6b6413b7

    • SSDEEP

      384:RoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIX:G7O89p2rRpcnut

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks