General

  • Target

    2d373452dedac769b8f2ef99985f0c1fd21f4a5d45f45b9e301196da80223ec4.exe

  • Size

    23KB

  • Sample

    240928-mdcwsszhkj

  • MD5

    84673a3ddd2ad4bf77244c35ef438782

  • SHA1

    3e0f4433e026ade25d9d4d64641c7b710aa6da58

  • SHA256

    2d373452dedac769b8f2ef99985f0c1fd21f4a5d45f45b9e301196da80223ec4

  • SHA512

    78bce3e252e75dba48da695548ea20b370083ff516864d11b8e624a4309c1e6cc751b49135f975cfbada6d7cecee4cfe00e95ff8db2046019e4e52bfeba5c1c9

  • SSDEEP

    384:6cqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZcZ2:930py6vhxaRpcnuH2

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:2020

Mutex

9d69fd371d1748841c380221ed6bddf5

Attributes
  • reg_key

    9d69fd371d1748841c380221ed6bddf5

  • splitter

    |'|'|

Targets

    • Target

      2d373452dedac769b8f2ef99985f0c1fd21f4a5d45f45b9e301196da80223ec4.exe

    • Size

      23KB

    • MD5

      84673a3ddd2ad4bf77244c35ef438782

    • SHA1

      3e0f4433e026ade25d9d4d64641c7b710aa6da58

    • SHA256

      2d373452dedac769b8f2ef99985f0c1fd21f4a5d45f45b9e301196da80223ec4

    • SHA512

      78bce3e252e75dba48da695548ea20b370083ff516864d11b8e624a4309c1e6cc751b49135f975cfbada6d7cecee4cfe00e95ff8db2046019e4e52bfeba5c1c9

    • SSDEEP

      384:6cqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZcZ2:930py6vhxaRpcnuH2

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks