General

  • Target

    47c5387e8459af563993969200416cae6f9ad30748060c8d952c0ad4d2bae3e7.exe

  • Size

    32KB

  • Sample

    240928-jyb88avflk

  • MD5

    f5556b1489831f2959ac07f9ec3e62ae

  • SHA1

    8f01af126f5f97194300a270e117573079520567

  • SHA256

    47c5387e8459af563993969200416cae6f9ad30748060c8d952c0ad4d2bae3e7

  • SHA512

    c9e861907904cf8261624667567e91b8af4d8f34847259bb662800730edf43e7b78551214c1de58025bd1098c1aec0139cd41fdcd322795d2e8b6040942799c5

  • SSDEEP

    384:3YFaoEU3qeaRsi2ZEdNwXwhFPIC2Tg4wlDvodg9TdFpyFEIGsJjwE7UMcrie48eb:IHtrZEEILhouDbEEIGfR4+f

Malware Config

Extracted

Family

njrat

Botnet

Hacked By HiDDen PerSOn

Mutex

10e0199d9f6bf1986ef5592b8c19ee8d

Attributes
  • reg_key

    10e0199d9f6bf1986ef5592b8c19ee8d

Targets

    • Target

      47c5387e8459af563993969200416cae6f9ad30748060c8d952c0ad4d2bae3e7.exe

    • Size

      32KB

    • MD5

      f5556b1489831f2959ac07f9ec3e62ae

    • SHA1

      8f01af126f5f97194300a270e117573079520567

    • SHA256

      47c5387e8459af563993969200416cae6f9ad30748060c8d952c0ad4d2bae3e7

    • SHA512

      c9e861907904cf8261624667567e91b8af4d8f34847259bb662800730edf43e7b78551214c1de58025bd1098c1aec0139cd41fdcd322795d2e8b6040942799c5

    • SSDEEP

      384:3YFaoEU3qeaRsi2ZEdNwXwhFPIC2Tg4wlDvodg9TdFpyFEIGsJjwE7UMcrie48eb:IHtrZEEILhouDbEEIGfR4+f

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks