General

  • Target

    9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a

  • Size

    93KB

  • Sample

    240930-a5dk7ayenr

  • MD5

    49130501c3e3ced98b19c89406ea8afa

  • SHA1

    57fd8ae8455d6d6af27ee88a51e32ace8d7ef588

  • SHA256

    9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a

  • SHA512

    ead3d077eb9f79a32de75531570bbce895852058c20c0deb440e3c832e3407249088e6218094b9789ee69ca707482e5be729ccdc00c2d3f8e709324adfa5080b

  • SSDEEP

    768:IY3/upD9O/pBcxYsbae6GIXb9pDX2b9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3jsGa:PuLOx6baIa9RIj00ljEwzGi1dDvDEgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

36dd2bffd730e382987c13909f3cc4a3

Attributes
  • reg_key

    36dd2bffd730e382987c13909f3cc4a3

  • splitter

    |'|'|

Targets

    • Target

      9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a

    • Size

      93KB

    • MD5

      49130501c3e3ced98b19c89406ea8afa

    • SHA1

      57fd8ae8455d6d6af27ee88a51e32ace8d7ef588

    • SHA256

      9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a

    • SHA512

      ead3d077eb9f79a32de75531570bbce895852058c20c0deb440e3c832e3407249088e6218094b9789ee69ca707482e5be729ccdc00c2d3f8e709324adfa5080b

    • SSDEEP

      768:IY3/upD9O/pBcxYsbae6GIXb9pDX2b9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3jsGa:PuLOx6baIa9RIj00ljEwzGi1dDvDEgS

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks