General

  • Target

    eee08cea677b93199fd1ad83347b8176bde16b3ee99c54f69c06a9e652217d5b

  • Size

    876KB

  • Sample

    240929-et5mrazbnr

  • MD5

    d2f1b1af7a46c20e123e0ae887189ff9

  • SHA1

    bed60ed94e966aff0222185c5dfc2449330ec3bf

  • SHA256

    eee08cea677b93199fd1ad83347b8176bde16b3ee99c54f69c06a9e652217d5b

  • SHA512

    5cb5c610d460bbafb67f8025cd76192028312708027133d0787f194d4582e1146502190ab52d52305ecde8c79be219c28bc813058be80c4d15ab345474fb1550

  • SSDEEP

    12288:E4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUga47X4q9MmCS:E4lavt0LkLL9IMixoEgea4X4q9MmCS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      eee08cea677b93199fd1ad83347b8176bde16b3ee99c54f69c06a9e652217d5b

    • Size

      876KB

    • MD5

      d2f1b1af7a46c20e123e0ae887189ff9

    • SHA1

      bed60ed94e966aff0222185c5dfc2449330ec3bf

    • SHA256

      eee08cea677b93199fd1ad83347b8176bde16b3ee99c54f69c06a9e652217d5b

    • SHA512

      5cb5c610d460bbafb67f8025cd76192028312708027133d0787f194d4582e1146502190ab52d52305ecde8c79be219c28bc813058be80c4d15ab345474fb1550

    • SSDEEP

      12288:E4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUga47X4q9MmCS:E4lavt0LkLL9IMixoEgea4X4q9MmCS

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks