General

  • Target

    e7b54cee614879d3348ce7aed966ec656eeb2dfe5e10c4c46c223488843afc47

  • Size

    1.2MB

  • Sample

    240921-yele4szdmr

  • MD5

    fca066e3871946f3f04d016f90c7eb09

  • SHA1

    54f13fd7384d592fc1d02e027aab5f422770012e

  • SHA256

    e7b54cee614879d3348ce7aed966ec656eeb2dfe5e10c4c46c223488843afc47

  • SHA512

    cced5ff80cdc33e747e1ffb16e3d44c6e6f5aaab9a54e24bbfbb56b4451c14e255d5253cb2f00fd101c4fb9b77e512124131d8906bee5f176d6043970a8270a8

  • SSDEEP

    12288:shad/nhhh+E0AtduJRmZJaR/M3P9MUsuyWiP8Bt6hl1c7:dd/nNqAqJkaRE5JBtIl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ROMA 1940

C2

seznam.hopto.org:1177

Mutex

58815759959944c4bb49f4885faebc1e

Attributes
  • reg_key

    58815759959944c4bb49f4885faebc1e

  • splitter

    |'|'|

Targets

    • Target

      e7b54cee614879d3348ce7aed966ec656eeb2dfe5e10c4c46c223488843afc47

    • Size

      1.2MB

    • MD5

      fca066e3871946f3f04d016f90c7eb09

    • SHA1

      54f13fd7384d592fc1d02e027aab5f422770012e

    • SHA256

      e7b54cee614879d3348ce7aed966ec656eeb2dfe5e10c4c46c223488843afc47

    • SHA512

      cced5ff80cdc33e747e1ffb16e3d44c6e6f5aaab9a54e24bbfbb56b4451c14e255d5253cb2f00fd101c4fb9b77e512124131d8906bee5f176d6043970a8270a8

    • SSDEEP

      12288:shad/nhhh+E0AtduJRmZJaR/M3P9MUsuyWiP8Bt6hl1c7:dd/nNqAqJkaRE5JBtIl

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks