General

  • Target

    22d836128a4dbbec539196ddfac90474a71230f43b9527f9f37d5f3a56bbb535.exe

  • Size

    29KB

  • Sample

    240928-jtq7ksvdql

  • MD5

    ddbe487c1634c1e75ad1c8f414440a1c

  • SHA1

    12b7db12337f1647baa5525a36cbdc22dc0d4669

  • SHA256

    22d836128a4dbbec539196ddfac90474a71230f43b9527f9f37d5f3a56bbb535

  • SHA512

    8e98bc8643dc7d9d3f2a899575ba049ab76f3db026ae1faddb8a26c12ac95d8a8a27cd12be608c7d8196c93f9a397bd4f5ebe74cce9eb5d6c1ee7949cb7ec986

  • SSDEEP

    384:JaFCtl7Dh+oqIqEXV5HEQTGumqDgN3eH6GBsbh0w4wlAokw9OhgOL1vYRGOZz7+:X74oqIjlLTAqM3eFBKh0p29SgRjQe

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

YourPhone

C2

157.245.220.192:1177

Mutex

bec01544ef6b0bb361f68d796213ad70

Attributes
  • reg_key

    bec01544ef6b0bb361f68d796213ad70

  • splitter

    |'|'|

Targets

    • Target

      22d836128a4dbbec539196ddfac90474a71230f43b9527f9f37d5f3a56bbb535.exe

    • Size

      29KB

    • MD5

      ddbe487c1634c1e75ad1c8f414440a1c

    • SHA1

      12b7db12337f1647baa5525a36cbdc22dc0d4669

    • SHA256

      22d836128a4dbbec539196ddfac90474a71230f43b9527f9f37d5f3a56bbb535

    • SHA512

      8e98bc8643dc7d9d3f2a899575ba049ab76f3db026ae1faddb8a26c12ac95d8a8a27cd12be608c7d8196c93f9a397bd4f5ebe74cce9eb5d6c1ee7949cb7ec986

    • SSDEEP

      384:JaFCtl7Dh+oqIqEXV5HEQTGumqDgN3eH6GBsbh0w4wlAokw9OhgOL1vYRGOZz7+:X74oqIjlLTAqM3eFBKh0p29SgRjQe

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks