General

  • Target

    57a9e199176b14c33f65ff74e8a9c858beef84d247c29d925d87c6e8313b9e92.exe

  • Size

    29KB

  • Sample

    240928-jwjwaavemp

  • MD5

    6f2eadcd5be52ef9bdc22589c11683ae

  • SHA1

    1896d589f58067d5daa084106a73d9da5e44cd65

  • SHA256

    57a9e199176b14c33f65ff74e8a9c858beef84d247c29d925d87c6e8313b9e92

  • SHA512

    204a6ca666f50bb0ce53ebb6d47ff905a2afda86fd171ce700be46ba7589513e2cd468a0d2a8aaa5a90fb0cdb878fc059d84b6ad254ce82d8a6a488b0e95d4d5

  • SSDEEP

    384:NBs/hl7b1/JEI+GPWrb5hFEaemqD6CLeQTGBsbh0w4wlAokw9OhgOL1vYRGOZzsC:N47bXEI+GevhEsqdLe3BKh0p29SgRuI

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

43.229.151.171:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      57a9e199176b14c33f65ff74e8a9c858beef84d247c29d925d87c6e8313b9e92.exe

    • Size

      29KB

    • MD5

      6f2eadcd5be52ef9bdc22589c11683ae

    • SHA1

      1896d589f58067d5daa084106a73d9da5e44cd65

    • SHA256

      57a9e199176b14c33f65ff74e8a9c858beef84d247c29d925d87c6e8313b9e92

    • SHA512

      204a6ca666f50bb0ce53ebb6d47ff905a2afda86fd171ce700be46ba7589513e2cd468a0d2a8aaa5a90fb0cdb878fc059d84b6ad254ce82d8a6a488b0e95d4d5

    • SSDEEP

      384:NBs/hl7b1/JEI+GPWrb5hFEaemqD6CLeQTGBsbh0w4wlAokw9OhgOL1vYRGOZzsC:N47bXEI+GevhEsqdLe3BKh0p29SgRuI

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks