General

  • Target

    792b0dd50370efbdaadc2e1b9c71ed81c4219982357cbfa559a4494797b7585c

  • Size

    23KB

  • Sample

    240924-2yc5mazgjl

  • MD5

    b0b85bfca63883d245c4834357cec7ae

  • SHA1

    6bf82cd93a32ca03eafeef76b735bae1ea3d05f2

  • SHA256

    792b0dd50370efbdaadc2e1b9c71ed81c4219982357cbfa559a4494797b7585c

  • SHA512

    7b44fce09e9325c34ab3c3d122fdc82a10a5931df3305e1e44bb005da738aa872f88f16d7df340cb777efc24bf265f0c6e1a4a72a8ee729b9f2bf6792e9bd75c

  • SSDEEP

    384:I8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kf:HXcwt3tRpcnuJ+

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      792b0dd50370efbdaadc2e1b9c71ed81c4219982357cbfa559a4494797b7585c

    • Size

      23KB

    • MD5

      b0b85bfca63883d245c4834357cec7ae

    • SHA1

      6bf82cd93a32ca03eafeef76b735bae1ea3d05f2

    • SHA256

      792b0dd50370efbdaadc2e1b9c71ed81c4219982357cbfa559a4494797b7585c

    • SHA512

      7b44fce09e9325c34ab3c3d122fdc82a10a5931df3305e1e44bb005da738aa872f88f16d7df340cb777efc24bf265f0c6e1a4a72a8ee729b9f2bf6792e9bd75c

    • SSDEEP

      384:I8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kf:HXcwt3tRpcnuJ+

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks