General

  • Target

    4471a1f18932ce414c3a3a47738cd5493aead19344f4d39ae03e95ed8535833cN.exe

  • Size

    23KB

  • Sample

    240925-ptsy3ayfpa

  • MD5

    c09fddfb2808950a19e5faf5ed74b040

  • SHA1

    188f71d05e302fb9b3fc79f4a19992b5c9a80f41

  • SHA256

    4471a1f18932ce414c3a3a47738cd5493aead19344f4d39ae03e95ed8535833c

  • SHA512

    bfac1a9bf515d5ff681bc76b122ca49810da83e45e5294ac6c516c16ec99ba0a50e4b6c14ff38912088eb10d02ae086b3bb6073875214bae2505f638830c0bda

  • SSDEEP

    384:eI2SUCoQ3XgUzwsGCw5zSEZJgA6hgHpFChrV1mRvR6JZlbw8hqIusZzZ8u:RNnzdwk8Rpcnuw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

TRG

C2

192.168.56.1:2587

Mutex

17d5a91fa68b94dd8c59ab2cd10978e6

Attributes
  • reg_key

    17d5a91fa68b94dd8c59ab2cd10978e6

  • splitter

    |'|'|

Targets

    • Target

      4471a1f18932ce414c3a3a47738cd5493aead19344f4d39ae03e95ed8535833cN.exe

    • Size

      23KB

    • MD5

      c09fddfb2808950a19e5faf5ed74b040

    • SHA1

      188f71d05e302fb9b3fc79f4a19992b5c9a80f41

    • SHA256

      4471a1f18932ce414c3a3a47738cd5493aead19344f4d39ae03e95ed8535833c

    • SHA512

      bfac1a9bf515d5ff681bc76b122ca49810da83e45e5294ac6c516c16ec99ba0a50e4b6c14ff38912088eb10d02ae086b3bb6073875214bae2505f638830c0bda

    • SSDEEP

      384:eI2SUCoQ3XgUzwsGCw5zSEZJgA6hgHpFChrV1mRvR6JZlbw8hqIusZzZ8u:RNnzdwk8Rpcnuw

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks