General

  • Target

    00d4903c9864c5b55f6cba9848f3bc2f2976ad18e9c5763408323c8d9505ff68.exe

  • Size

    23KB

  • Sample

    240927-x86gpsxhlb

  • MD5

    15062782b7ebad7e99adc7167d924e85

  • SHA1

    baddee4d37392158d8875266f073429f5fced450

  • SHA256

    00d4903c9864c5b55f6cba9848f3bc2f2976ad18e9c5763408323c8d9505ff68

  • SHA512

    c91e5d18ac1830d8972041379179d59c9dbae182ad7bce3956fa3a0dbcd23f2259c1c22f55edcf5961504f3c7da038321b53af8d4823df2e9194ca8a03c8021d

  • SSDEEP

    384:qsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZWB:Ff65K2Yf1jKRpcnuF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

104.238.137.213:5552

Mutex

7e7d2a914b311829c9f6a5392c8f297e

Attributes
  • reg_key

    7e7d2a914b311829c9f6a5392c8f297e

  • splitter

    |'|'|

Targets

    • Target

      00d4903c9864c5b55f6cba9848f3bc2f2976ad18e9c5763408323c8d9505ff68.exe

    • Size

      23KB

    • MD5

      15062782b7ebad7e99adc7167d924e85

    • SHA1

      baddee4d37392158d8875266f073429f5fced450

    • SHA256

      00d4903c9864c5b55f6cba9848f3bc2f2976ad18e9c5763408323c8d9505ff68

    • SHA512

      c91e5d18ac1830d8972041379179d59c9dbae182ad7bce3956fa3a0dbcd23f2259c1c22f55edcf5961504f3c7da038321b53af8d4823df2e9194ca8a03c8021d

    • SSDEEP

      384:qsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZWB:Ff65K2Yf1jKRpcnuF

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks