General

  • Target

    fe288f5ec37f318223e6112af0e1ccbf290c321d13540c0fef1743ab2b191685N

  • Size

    29KB

  • Sample

    240930-abtejsxarq

  • MD5

    4b7bb7bad08d60eb78b3f51602b27250

  • SHA1

    273d281125e0e407fbc87c2dd1a18279eef1bc11

  • SHA256

    fe288f5ec37f318223e6112af0e1ccbf290c321d13540c0fef1743ab2b191685

  • SHA512

    d6ff81aa2a045ede6ee3fb0553bbf3cd9389e7185fa53d347f6f6d28cf8495cd14649269b9a92d446db3a191aa271554f5e7cd072169c6344cbcd9c129a62799

  • SSDEEP

    384:Sx8EBl7Bvgk4Xe0exn5RhVNaemqDh9xrefTGBsbh0w4wlAokw9OhgOL1vYRGOZzq:SN7Kk4XePlFzsq3xre6BKh0p29SgR43

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed4

C2

getf2f.zapto.org:8884

Mutex

8d7adfba634ca4d7fd0411eab4206b44

Attributes
  • reg_key

    8d7adfba634ca4d7fd0411eab4206b44

  • splitter

    |'|'|

Targets

    • Target

      fe288f5ec37f318223e6112af0e1ccbf290c321d13540c0fef1743ab2b191685N

    • Size

      29KB

    • MD5

      4b7bb7bad08d60eb78b3f51602b27250

    • SHA1

      273d281125e0e407fbc87c2dd1a18279eef1bc11

    • SHA256

      fe288f5ec37f318223e6112af0e1ccbf290c321d13540c0fef1743ab2b191685

    • SHA512

      d6ff81aa2a045ede6ee3fb0553bbf3cd9389e7185fa53d347f6f6d28cf8495cd14649269b9a92d446db3a191aa271554f5e7cd072169c6344cbcd9c129a62799

    • SSDEEP

      384:Sx8EBl7Bvgk4Xe0exn5RhVNaemqDh9xrefTGBsbh0w4wlAokw9OhgOL1vYRGOZzq:SN7Kk4XePlFzsq3xre6BKh0p29SgR43

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks