General

  • Target

    b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6N

  • Size

    71KB

  • Sample

    240930-a2p5taydkp

  • MD5

    a3e86a6a1a141f274851a3502037b980

  • SHA1

    741c4ea32737cee7eb8e17580be198287065e693

  • SHA256

    b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6

  • SHA512

    e60f2f13c555145e75505cacfef9edc6baf7bac37499ff4ccda52467c09fbed55a83c78b5152eb91abd6cc0ef3dd41c0fbb4f991fca87443460f43fc767d7ed6

  • SSDEEP

    1536:6Uvs42tjhOUFWCsiSWS2RXEoZzD3lS3sKn61z1Fb9b:6U0DjkLfaR5hg3sdrt

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6N

    • Size

      71KB

    • MD5

      a3e86a6a1a141f274851a3502037b980

    • SHA1

      741c4ea32737cee7eb8e17580be198287065e693

    • SHA256

      b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6

    • SHA512

      e60f2f13c555145e75505cacfef9edc6baf7bac37499ff4ccda52467c09fbed55a83c78b5152eb91abd6cc0ef3dd41c0fbb4f991fca87443460f43fc767d7ed6

    • SSDEEP

      1536:6Uvs42tjhOUFWCsiSWS2RXEoZzD3lS3sKn61z1Fb9b:6U0DjkLfaR5hg3sdrt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks