General

  • Target

    00088a6956d78224ca50089dfbae6e18e6a37b49b3ba4e0da77dbed5885ae5e4

  • Size

    23KB

  • Sample

    240928-rgd1gszbqr

  • MD5

    4983c7e697ef045f1f5ea863b39330cf

  • SHA1

    9a60537b311d5f914fcc7bf2e5c7ed730cceaf7c

  • SHA256

    00088a6956d78224ca50089dfbae6e18e6a37b49b3ba4e0da77dbed5885ae5e4

  • SHA512

    b5ec54fcb3a50bf0f218ddc21e79ed7a2d03608e61214261a445b56af0a4da9928252bbd5f9e7342d8cbafc95904d1c187d965e637b3f3ee903e372029437a22

  • SSDEEP

    384:bslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ8b:ceEvwIlLMRpcnuJ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

32d1db139916a5baafbb6433a70c0fc5

Attributes
  • reg_key

    32d1db139916a5baafbb6433a70c0fc5

  • splitter

    |'|'|

Targets

    • Target

      00088a6956d78224ca50089dfbae6e18e6a37b49b3ba4e0da77dbed5885ae5e4

    • Size

      23KB

    • MD5

      4983c7e697ef045f1f5ea863b39330cf

    • SHA1

      9a60537b311d5f914fcc7bf2e5c7ed730cceaf7c

    • SHA256

      00088a6956d78224ca50089dfbae6e18e6a37b49b3ba4e0da77dbed5885ae5e4

    • SHA512

      b5ec54fcb3a50bf0f218ddc21e79ed7a2d03608e61214261a445b56af0a4da9928252bbd5f9e7342d8cbafc95904d1c187d965e637b3f3ee903e372029437a22

    • SSDEEP

      384:bslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ8b:ceEvwIlLMRpcnuJ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks