General

  • Target

    b3a4d7c4c5b4a03a8a11dc9f6bb313a4c6da0040f2e45a48dc76ebc3f12d7842.exe

  • Size

    23KB

  • Sample

    240927-q7qarsxhne

  • MD5

    19c553768fdae568484a2f94e8cc4853

  • SHA1

    994e146909e21f06fc8b10790ba4d731174b5467

  • SHA256

    b3a4d7c4c5b4a03a8a11dc9f6bb313a4c6da0040f2e45a48dc76ebc3f12d7842

  • SHA512

    214f78635c6cf20d102cd9a44891df7b9b86edfc166cb98d808e5b082ed8877bb0a69338202384d9b6d65aded388b3e656071f6479de03db72126d600c87c670

  • SSDEEP

    384:aweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZJV:FLq411eRpcnuo

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

jokernet2019.zapto.org:1919

Mutex

93080ac71d91ee73a3a32a91629cd207

Attributes
  • reg_key

    93080ac71d91ee73a3a32a91629cd207

  • splitter

    |'|'|

Extracted

Family

latentbot

C2

jokernet2019.zapto.org

Targets

    • Target

      b3a4d7c4c5b4a03a8a11dc9f6bb313a4c6da0040f2e45a48dc76ebc3f12d7842.exe

    • Size

      23KB

    • MD5

      19c553768fdae568484a2f94e8cc4853

    • SHA1

      994e146909e21f06fc8b10790ba4d731174b5467

    • SHA256

      b3a4d7c4c5b4a03a8a11dc9f6bb313a4c6da0040f2e45a48dc76ebc3f12d7842

    • SHA512

      214f78635c6cf20d102cd9a44891df7b9b86edfc166cb98d808e5b082ed8877bb0a69338202384d9b6d65aded388b3e656071f6479de03db72126d600c87c670

    • SSDEEP

      384:aweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZJV:FLq411eRpcnuo

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks