General

  • Target

    ab11bc4d914653846cd26f24d97e4dcc3a4901e1cb65d63bae55cfff4980182b

  • Size

    36KB

  • Sample

    240921-ndz7rsyhpd

  • MD5

    c5134fb49386eeb71898644c32734a48

  • SHA1

    dd12404f5ec48a710b76fd0c8f0ac96cce8f7358

  • SHA256

    ab11bc4d914653846cd26f24d97e4dcc3a4901e1cb65d63bae55cfff4980182b

  • SHA512

    f38bb80a0ae6c50c6cfb71bedf699dad227918a5295a0c4638770c0e6210a4de507deb2f563f9d6ca93a3163bad8a73220aef080fee437706db795d88ff1a342

  • SSDEEP

    384:CgDZ4XaCis7/WRdL5kyc/VQP7TngCANIUrAF+rMRTyN/0L+EcoinblneHQM3epz2:hD6XQD5nc/VQnFAZrM+rMRa8NuHgt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

iTzM7D_Hacker

C2

sound-falls.gl.at.ply.gg:1

Mutex

aa0ce714708cc7dc2f9fd91ced17cc60

Attributes
  • reg_key

    aa0ce714708cc7dc2f9fd91ced17cc60

  • splitter

    |'|'|

Targets

    • Target

      ab11bc4d914653846cd26f24d97e4dcc3a4901e1cb65d63bae55cfff4980182b

    • Size

      36KB

    • MD5

      c5134fb49386eeb71898644c32734a48

    • SHA1

      dd12404f5ec48a710b76fd0c8f0ac96cce8f7358

    • SHA256

      ab11bc4d914653846cd26f24d97e4dcc3a4901e1cb65d63bae55cfff4980182b

    • SHA512

      f38bb80a0ae6c50c6cfb71bedf699dad227918a5295a0c4638770c0e6210a4de507deb2f563f9d6ca93a3163bad8a73220aef080fee437706db795d88ff1a342

    • SSDEEP

      384:CgDZ4XaCis7/WRdL5kyc/VQP7TngCANIUrAF+rMRTyN/0L+EcoinblneHQM3epz2:hD6XQD5nc/VQnFAZrM+rMRa8NuHgt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks