General

  • Target

    08acbab0b8636551ed3a2a00e31bf05f00078683be490dd72950557d874048efN.exe

  • Size

    1.3MB

  • Sample

    240925-lm6pssyaql

  • MD5

    5039ef77f746038b364dd9af10956370

  • SHA1

    10c0f4432273e60645bbca4d06f32b74e528d8f2

  • SHA256

    08acbab0b8636551ed3a2a00e31bf05f00078683be490dd72950557d874048ef

  • SHA512

    1455bccd5df3af37c35cbfe21ad2548dc04d60e7b7ddf0a84145b62d10ace7dbad0e23015aff412ee587f755a9f16ea186c8383a882f7a0e1f594739118088c7

  • SSDEEP

    12288:QOUPHI3GgaOWPBh+E0AtduJRmZJaR/M3P9MUsuyWiP8Bt6ml1c7:eI3GgbQfqAqJkaRE5JBtHl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ROMA 1940

C2

seznam.hopto.org:1177

Mutex

58815759959944c4bb49f4885faebc1e

Attributes
  • reg_key

    58815759959944c4bb49f4885faebc1e

  • splitter

    |'|'|

Targets

    • Target

      08acbab0b8636551ed3a2a00e31bf05f00078683be490dd72950557d874048efN.exe

    • Size

      1.3MB

    • MD5

      5039ef77f746038b364dd9af10956370

    • SHA1

      10c0f4432273e60645bbca4d06f32b74e528d8f2

    • SHA256

      08acbab0b8636551ed3a2a00e31bf05f00078683be490dd72950557d874048ef

    • SHA512

      1455bccd5df3af37c35cbfe21ad2548dc04d60e7b7ddf0a84145b62d10ace7dbad0e23015aff412ee587f755a9f16ea186c8383a882f7a0e1f594739118088c7

    • SSDEEP

      12288:QOUPHI3GgaOWPBh+E0AtduJRmZJaR/M3P9MUsuyWiP8Bt6ml1c7:eI3GgbQfqAqJkaRE5JBtHl

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks